WorldWideScience

Sample records for one-way key rates

  1. Randomized dynamical decoupling strategies and improved one-way key rates for quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Kern, Oliver

    2009-05-25

    The present thesis deals with various methods of quantum error correction. It is divided into two parts. In the first part, dynamical decoupling methods are considered which have the task of suppressing the influence of residual imperfections in a quantum memory. Such imperfections might be given by couplings between the finite dimensional quantum systems (qudits) constituting the quantum memory, for instance. The suppression is achieved by altering the dynamics of an imperfect quantum memory with the help of a sequence of local unitary operations applied to the qudits. Whereas up to now the operations of such decoupling sequences have been constructed in a deterministic fashion, strategies are developed in this thesis which construct the operations by random selection from a suitable set. Formulas are derived which estimate the average performance of such strategies. As it turns out, randomized decoupling strategies offer advantages and disadvantages over deterministic ones. It is possible to benefit from the advantages of both kind of strategies by designing combined strategies. Furthermore, it is investigated if and how the discussed decoupling strategies can be employed to protect a quantum computation running on the quantum memory. It is shown that a purely randomized decoupling strategy may be used by applying the decoupling operations and adjusted gates of the quantum algorithm in an alternating fashion. Again this method can be enhanced by the means of deterministic methods in order to obtain a combined decoupling method for quantum computations analogously to the combining strategies for quantum memories. The second part of the thesis deals with quantum error-correcting codes and protocols for quantum key distribution. The focus is on the BB84 and the 6-state protocol making use of only one-way communication during the error correction and privacy amplification steps. It is shown that by adding additional errors to the preliminary key (a process called

  2. One-way quantum identity authentication based on public key

    Institute of Scientific and Technical Information of China (English)

    ZHANG XingLan

    2009-01-01

    Based on public key, a quantum identity authenticated (QIA) system is proposed without quantum entanglement. The public key acts as the authentication key of a user. Following the idea of the classical public key infrastructure (PKI), a trusted center of authentication (CA) is involved. The user selects a public key randomly and CA generates a private key for the user according to his public key. When it is necessary to perform QIA, the user sends a sequence of single photons encoded with its private key and a message to CA. According to the corresponding secret key kept by CA, CA performs the unitary operations on the single photon sequence. At last, the receiver can judge whether the user is an impersonator.

  3. An efficient authentication scheme based on one-way key chain for sensor network

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    To strike a tradeoff between the security and the consumption of energy, computing and communication resources in the nodes, this paper presents an efficient authentication scheme based on one-way key chain for sensor network. The scheme can provide immediate authentication to fulfill the latency and the storage requirements and defends against various attacks such as replay, impersonation and denial of service. Meanwhile,our scheme possesses low overhead and scalability to large networks. Furthermore, the simple related protocols or algorithms in the scheme and inexpensive public-key operation required in view of resource-starved sensor nodes minimize the storage, computation and communication overhead, and improve the efficiency of our scheme. In addition, the proposed scheme also supports source authentication without precluding in-network processing and passive participation.

  4. Improved one-way hash chain and revocation polynomial-based self-healing group key distribution schemes in resource-constrained wireless networks.

    Science.gov (United States)

    Chen, Huifang; Xie, Lei

    2014-12-18

    Self-healing group key distribution (SGKD) aims to deal with the key distribution problem over an unreliable wireless network. In this paper, we investigate the SGKD issue in resource-constrained wireless networks. We propose two improved SGKD schemes using the one-way hash chain (OHC) and the revocation polynomial (RP), the OHC&RP-SGKD schemes. In the proposed OHC&RP-SGKD schemes, by introducing the unique session identifier and binding the joining time with the capability of recovering previous session keys, the problem of the collusion attack between revoked users and new joined users in existing hash chain-based SGKD schemes is resolved. Moreover, novel methods for utilizing the one-way hash chain and constructing the personal secret, the revocation polynomial and the key updating broadcast packet are presented. Hence, the proposed OHC&RP-SGKD schemes eliminate the limitation of the maximum allowed number of revoked users on the maximum allowed number of sessions, increase the maximum allowed number of revoked/colluding users, and reduce the redundancy in the key updating broadcast packet. Performance analysis and simulation results show that the proposed OHC&RP-SGKD schemes are practical for resource-constrained wireless networks in bad environments, where a strong collusion attack resistance is required and many users could be revoked.

  5. Improved One-Way Hash Chain and Revocation Polynomial-Based Self-Healing Group Key Distribution Schemes in Resource-Constrained Wireless Networks

    Directory of Open Access Journals (Sweden)

    Huifang Chen

    2014-12-01

    Full Text Available Self-healing group key distribution (SGKD aims to deal with the key distribution problem over an unreliable wireless network. In this paper, we investigate the SGKD issue in resource-constrained wireless networks. We propose two improved SGKD schemes using the one-way hash chain (OHC and the revocation polynomial (RP, the OHC&RP-SGKD schemes. In the proposed OHC&RP-SGKD schemes, by introducing the unique session identifier and binding the joining time with the capability of recovering previous session keys, the problem of the collusion attack between revoked users and new joined users in existing hash chain-based SGKD schemes is resolved. Moreover, novel methods for utilizing the one-way hash chain and constructing the personal secret, the revocation polynomial and the key updating broadcast packet are presented. Hence, the proposed OHC&RP-SGKD schemes eliminate the limitation of the maximum allowed number of revoked users on the maximum allowed number of sessions, increase the maximum allowed number of revoked/colluding users, and reduce the redundancy in the key updating broadcast packet. Performance analysis and simulation results show that the proposed OHC&RP-SGKD schemes are practical for resource-constrained wireless networks in bad environments, where a strong collusion attack resistance is required and many users could be revoked.

  6. One-way radiative transfer

    Science.gov (United States)

    González-Rodríguez, Pedro; Ilan, Boaz; Kim, Arnold D.

    2016-06-01

    We introduce the one-way radiative transfer equation (RTE) for modeling the transmission of a light beam incident normally on a slab composed of a uniform forward-peaked scattering medium. Unlike the RTE, which is formulated as a boundary value problem, the one-way RTE is formulated as an initial value problem. Consequently, the one-way RTE is much easier to solve. We discuss the relation of the one-way RTE to the Fokker-Planck, small-angle, and Fermi pencil beam approximations. Then, we validate the one-way RTE through systematic comparisons with RTE simulations for both the Henyey-Greenstein and screened Rutherford scattering phase functions over a broad range of albedo, anisotropy factor, optical thickness, and refractive index values. We find that the one-way RTE gives very good approximations for a broad range of optical property values for thin to moderately thick media that have moderately to sharply forward-peaked scattering. Specifically, we show that the error made by the one-way RTE decreases monotonically as the anisotropic factor increases and as the albedo increases. On the other hand, the error increases monotonically as the optical thickness increases and the refractive index mismatch at the boundary increases.

  7. One way to Lorentz's Transformations

    CERN Document Server

    Bessonov, E G

    2012-01-01

    The derivation of Lorentz Transformations (LT) based on the Principle of Relativity and dependence of the rate of clocks tick (time dilation) on their velocity is presented. The analysis of different ways of the LT derivation allows to look at LT and their consequences from different standpoints, to make them more accessible to a wide circle of readers interested in the relativistic physics.

  8. One-way unlocalizable quantum discord

    Science.gov (United States)

    Xi, Zhengjun; Fan, Heng; Li, Yongming

    2012-05-01

    In this paper, we present the concept of the one-way unlocalizable quantum discord and investigate its properties. We provide a polygamy inequality for it in a tripartite pure quantum system of arbitrary dimension. Several tradeoff relations between the one-way unlocalizable quantum discord and other correlations are given. If the von Neumann measurement is made on a part of the system, we give two expressions of the one-way unlocalizable quantum discord in terms of partial distillable entanglement and quantum disturbance. Finally, we also provide a lower bound for bipartite shareability of quantum correlation beyond entanglement in a tripartite system.

  9. The one-way unlocalizable quantum discord

    CERN Document Server

    Xi, Zhengjun; Li, Yongming

    2012-01-01

    In this paper, we present the concept of the one-way unlocalizable quantum discord and investigate its properties. We provide a polygamy inequality for it in tripartite pure quantum system of arbitrary dimension. Several trade-offs between the one-way unlocalizable quantum discord and other correlations are given. If the von Neumann measurement is on a part of the system, we give two expressions of the one-way unlocalizable quantum discord in terms of partial distillable entanglement and quantum disturbance. Finally, we also provide a lower bound for bipartite shareability of quantum correlation beyond entanglement in a tripartite system.

  10. Experimental one-way quantum computing.

    Science.gov (United States)

    Walther, P; Resch, K J; Rudolph, T; Schenck, E; Weinfurter, H; Vedral, V; Aspelmeyer, M; Zeilinger, A

    2005-03-10

    Standard quantum computation is based on sequences of unitary quantum logic gates that process qubits. The one-way quantum computer proposed by Raussendorf and Briegel is entirely different. It has changed our understanding of the requirements for quantum computation and more generally how we think about quantum physics. This new model requires qubits to be initialized in a highly entangled cluster state. From this point, the quantum computation proceeds by a sequence of single-qubit measurements with classical feedforward of their outcomes. Because of the essential role of measurement, a one-way quantum computer is irreversible. In the one-way quantum computer, the order and choices of measurements determine the algorithm computed. We have experimentally realized four-qubit cluster states encoded into the polarization state of four photons. We characterize the quantum state fully by implementing experimental four-qubit quantum state tomography. Using this cluster state, we demonstrate the feasibility of one-way quantum computing through a universal set of one- and two-qubit operations. Finally, our implementation of Grover's search algorithm demonstrates that one-way quantum computation is ideally suited for such tasks.

  11. Bargaining Mechanisms for One-Way Games

    Directory of Open Access Journals (Sweden)

    Andrés Abeliuk

    2015-09-01

    Full Text Available We introduce one-way games, a two-player framework whose distinguishable feature is that the private payoff of one (independent player is determined only by her own strategy and does not depend on the actions taken by the other (dependent player. We show that the equilibrium outcome in one-way games without side payments and the social cost of any ex post efficient mechanism can be far from the optimum. We also show that it is impossible to design a Bayes–Nash incentive-compatible mechanism for one-way games that is budget-balanced, individually rational and efficient. To address this negative result, we propose a privacy-preserving mechanism based on a single-offer bargaining made by the dependent player that leverages the intrinsic advantage of the independent player. In this setting the outside option of the dependent player is not known a priori; however, we show that the mechanism satisfies individual rationality conditions, is incentive-compatible, budget-balanced and produces an outcome that is more efficient than the equilibrium without payments. Finally, we show that a randomized multi-offer extension brings no additional benefit in terms of efficiency.

  12. New Public Key Certificate Revocation Scheme Based on One-way Hash Chain%基于单向散列链的公钥证书撤销机制

    Institute of Scientific and Technical Information of China (English)

    李景峰; 潘恒; 祝跃飞

    2006-01-01

    证书撤销是公钥基础设施(PKI,Public Key Infrastructure)研究和应用的难点问题.本文首先讨论了当前应用最广泛的两类证书撤销机制-证书撤销列表(CRL, Certificate Revocation List)和在线证书状态协议(OCSP, Online Certificate Status Protocol),剖析了这两种机制各自存在的不足.在此基础上,提出了一种基于单向散列链的证书撤销机制.

  13. Logica's one-way VSAT system

    Science.gov (United States)

    Barrington-Cook, J. I.

    1991-01-01

    Logica has recently produced the main 'collection and forwarding' element for a comprehensive one-way VSAT system. The system is designed to utilize the extra bandwidth available from direct-to-home broadcasts using the MAC/packet television standard, in order to provide point-to-multipoint data transmission via satellite. The expectation of very large volumes of supply for standard decoders, together with the large amount of bandwidth available, suggest that extremely low cost data transmission may become available. The system is designed to provide the necessary infrastructure to allow this bulk data, low cost approach to be offered for small scale and ad-hoc data transmission.

  14. Quantum Digital Signature based on quantum one-way functions

    CERN Document Server

    Lü, X; L\\"u, Xin; Feng, Deng-Guo

    2004-01-01

    A quantum digital signature protocol based on quantum mechanics is proposed in this paper. The security of the protocol relies on the existence of quantum one-way functions by quantum information theorem. This protocol involves a so-called arbitrator who validates and authenticates the signed message. In this protocol, we use privacy key algorithm to ensure the security of quantum information on channel and use quantum public keys to sign message. To guarantee the authenticity of the message, a family of quantum stabilizer codes are employed. Our protocol presents a novel method to construct ultimately secure digital system in future secure communication.

  15. Constructing a one-way hash function one-way function based on the unified Chaotic system

    Institute of Scientific and Technical Information of China (English)

    Long Min; Peng Fei; Chen Guan-Rong

    2008-01-01

    A new one-way hash function based on the unified chaotic system is constructed.With different values of a key parameter,the unified chaotic system represents different chaotic systems,based on which the one-way hash function algorithm is constructed with three round operations and an initial vector on an input message.In each round operation,the parameters are processed by three different chaotic systems generated from the unified chaotic system.Feed-forwards are used at the end of each round operation and at the end of each element of the message processing.Meanwhile,in each round operation,parameter-exchanging operations are implemented.Then,the hash value of length 160 bits is obtained from the last six parameters.Simulation and analysis both demonstrate that the algorithm has great flexibility,satisfactory hash performance,weak collision property,and high security.

  16. One way Doppler extractor. Volume 1: Vernier technique

    Science.gov (United States)

    Blasco, R. W.; Klein, S.; Nossen, E. J.; Starner, E. R.; Yanosov, J. A.

    1974-01-01

    A feasibility analysis, trade-offs, and implementation for a One Way Doppler Extraction system are discussed. A Doppler error analysis shows that quantization error is a primary source of Doppler measurement error. Several competing extraction techniques are compared and a Vernier technique is developed which obtains high Doppler resolution with low speed logic. Parameter trade-offs and sensitivities for the Vernier technique are analyzed, leading to a hardware design configuration. A detailed design, operation, and performance evaluation of the resulting breadboard model is presented which verifies the theoretical performance predictions. Performance tests have verified that the breadboard is capable of extracting Doppler, on an S-band signal, to an accuracy of less than 0.02 Hertz for a one second averaging period. This corresponds to a range rate error of no more than 3 millimeters per second.

  17. Synthetic Aperture Sonar Imaging via One-Way Wave Equations

    CERN Document Server

    Huynh, Quyen

    2009-01-01

    We develop an efficient algorithm for Synthetic Aperture Sonar imaging based on the one-way wave equations. The algorithm utilizes the operator-splitting method to integrate the one-way wave equations. The well-posedness of the one-way wave equations and the proposed algorithm is shown. A computational result against real field data is reported and the resulting image is enhanced by the BV-like regularization.

  18. Epidemic spreading on one-way-coupled networks

    Science.gov (United States)

    Wang, Lingna; Sun, Mengfeng; Chen, Shanshan; Fu, Xinchu

    2016-09-01

    Numerous real-world networks (e.g., social, communicational, and biological networks) have been observed to depend on each other, and this results in interconnected networks with different topology structures and dynamics functions. In this paper, we focus on the scenario of epidemic spreading on one-way-coupled networks comprised of two subnetworks, which can manifest the transmission of some zoonotic diseases. By proposing a mathematical model through mean-field approximation approach, we prove the global stability of the disease-free and endemic equilibria of this model. Through the theoretical and numerical analysis, we obtain interesting results: the basic reproduction number R0 of the whole network is the maximum of the basic reproduction numbers of the two subnetworks; R0 is independent of the cross-infection rate and cross contact pattern; R0 increases rapidly with the growth of inner infection rate if the inner contact pattern is scale-free; in order to eradicate zoonotic diseases from human beings, we must simultaneously eradicate them from animals; bird-to-bird infection rate has bigger impact on the human's average infected density than bird-to-human infection rate.

  19. Multipartite distribution property of one way discord beyond measurement

    Science.gov (United States)

    Liu, Si-Yuan; Zhang, Yu-Ran; Yang, Wen-Li; Fan, Heng

    2015-03-01

    We investigate the distribution property of one way discord in the multipartite system by introducing the concept of polygamy deficit for one way discord. The difference between one way discord and quantum discord is analogue to the one between entanglement of assistance and entanglement of formation. For tripartite pure states, two kinds of polygamy deficits are presented with the equivalent expressions and physical interpretations regardless of measurement. For four-partite pure states, we provide a condition which makes one way discord polygamy satisfied. In addition, we generalize these results to the case for N-partite pure states. Those results can be applicable to multipartite quantum systems and are complementary to our understanding of the shareability of quantum correlations.

  20. One-way electromagnetic waveguide using multiferroic Fibonacci superlattices

    Science.gov (United States)

    Tang, Zhenghua; Lei, Dajun; Huang, Jianquan; Jin, Gui; Qiu, Feng; Yan, Wenyan

    2015-12-01

    The multiferroic Fibonacci superlattices (MFSs) are composed of single-phase multiferroic domains with polarization and magnetization according to the rule of Fibonacci sequence. We propose to construct a one-way electromagnetic waveguide by the MFSs. The forbidden band structures of the MFSs for the forward and backward electromagnetic waves are not completely overlapped, and an obvious translation between them occurs around the fixed point ω bar = 1 with broken time-reversal and space inversion symmetries (TRSIS), which indicates the existence of one-way electromagnetic modes in the MFSs. Transmission spectrum is utilized to present this property and to indicate further one-way electromagnetic modes lying within the polaritonic band gap. The maximum forbidden bandwidth (divided by midgap frequency) of 5.4% for the backward electromagnetic wave (BEW) is found, in which the forward electromagnetic wave (FEW) can pass. The functions of one-way propagation modes and polaritonic band gap integrated into the MFSs can miniaturize the one-way photonic devices. The properties can also be applied to construct compact microwave isolators.

  1. The one-way wave equation and its invariance properties

    Energy Technology Data Exchange (ETDEWEB)

    Leviandier, Luc [Thales Research and Technology, Campus de Polytechnique, 91767 Palaiseau (France); LAUM, CNRS, Universite du Maine, Av. O. Messiaen, 72085 Le Mans (France)], E-mail: luc.leviandier@thalesgroup.com, E-mail: luc.leviandier@univ-lemans.fr

    2009-07-03

    The harmonic wave equation in inhomogeneous media is exactly split into coupled first-order equations with respect to a principal direction of propagation according to the Bremmer scheme. The resulting one-way wave equation is shown not to conserve energy flux for dimensions two and three against the general belief in one-way wave propagation or parabolic equation literature. Conservation of energy flux is only ensured in the high frequency limit. On the other hand, a simple invariant is found that may be seen as a generalization of the Snell law to arbitrary, non-stratified, media. Similarly, the reciprocity property is not fully ensured in general and the time-reversal symmetry is ensured for propagating fields. Besides, in the one-way wave equation, the additional term to the standard parabolic equation is shown to strengthen mode coupling. The analysis encompasses the evanescent waves.

  2. Cooling Atoms with a Moving One-Way Barrier

    CERN Document Server

    Schoene, Elizabeth A; Steck, Daniel A; 10.1103/PhysRevA.82.023419

    2010-01-01

    We implement and demonstrate the effectiveness of a cooling scheme using a moving, all-optical, one-way barrier to cool a sample of $^{87}$Rb atoms, achieving nearly a factor of 2 reduction in temperature. The one-way barrier, composed of two focused, Gaussian laser beams, allows atoms incident on one side to transmit, while reflecting atoms incident on the other. The one-way barrier is adiabatically swept through a sample of atoms contained in a far-off-resonant, single-beam, optical dipole trap that forms a nearly harmonic trapping potential. As the barrier moves longitudinally through the potential, atoms become trapped to one side of the barrier with reduced kinetic energy. The adiabatic translation of the barrier leaves the atoms at the bottom of the trapping potential, only minimally increasing their kinetic energy.

  3. Topological one-way fiber of second Chern number

    CERN Document Server

    Lu, Ling

    2016-01-01

    Optical fiber is a ubiquitous and indispensable component in communications, sensing, biomedicine and many other lightwave technologies and applications. Here we propose topological one-way fibers to remove two fundamental mechanisms that limit fiber performance: scattering and reflection. We design three-dimensional~(3D) photonic crystal fibers, inside which photons propagate only in one direction, that are completely immune to Rayleigh and Mie scatterings and significantly suppress the nonlinear Brillouin and Raman scatterings. A one-way fiber is also free from Fresnel reflection, naturally eliminating the needs for fiber isolators. Our finding is enabled by the recently discovered Weyl points in a double-gyroid~(DG) photonic crystal. By annihilating two Weyl points by supercell modulation in a magnetic DG, we obtain the photonic analogue of the 3D quantum Hall phase with a non-zero first Chern number~($C_1$). When the modulation becomes helixes, one-way fiber modes develop along the winding axis, with the ...

  4. Efficient quantum circuits for one-way quantum computing.

    Science.gov (United States)

    Tanamoto, Tetsufumi; Liu, Yu-Xi; Hu, Xuedong; Nori, Franco

    2009-03-13

    While Ising-type interactions are ideal for implementing controlled phase flip gates in one-way quantum computing, natural interactions between solid-state qubits are most often described by either the XY or the Heisenberg models. We show an efficient way of generating cluster states directly using either the imaginary SWAP (iSWAP) gate for the XY model, or the sqrt[SWAP] gate for the Heisenberg model. Our approach thus makes one-way quantum computing more feasible for solid-state devices.

  5. Signal transmission in a Y-shaped one-way chain

    CERN Document Server

    Liang, Xiaoming; Lv, Huaping

    2013-01-01

    It has been found that noise plays a key role to improve signal transmission in a one-way chain of bistable systems [Zhang et al., Phys. Rev. E 58, 2952 (1998)]. We here show that the signal transmission can be sharply improved without the aid of noise, if the one-way chain with a single source node is changed with two source nodes becoming a Y-shaped one-way chain. We further reveal that the enhanced signal transmission in the Y-shaped one-way chain is regulated by coupling strength, and that it is robust to noise perturbation and input signal irregularity. We finally analyze the mechanism of the enhanced signal transmission by the Y-shaped structure.

  6. Fundamentals of universality in one-way quantum computation

    CERN Document Server

    Van den Nest, M; Dür, W; Miyake, A

    2007-01-01

    We build a framework allowing for a systematic investigation of the issue: "Which quantum states are universal resources for one-way quantum computation?" We start by re-examining what is exactly meant by "universality" in quantum computation, and what the implications are for universal one-way quantum computation. Given the framework of a measurement-based quantum computer, where quantum information is processed by local operations only, the most general universal one-way quantum computer is one which is capable of accepting arbitrary classical inputs and producing arbitrary quantum outputs--we refer to this property as CQ-universality. We then show that a systematic study of CQ-universality in one-way quantum computation is possible by identifying entanglement features that must be present in every universal resource. These insights are used to identify several states as being not universal, such as 1D cluster states, W states, and ground states of non-critical 1D spin systems. Our criteria are strengthened...

  7. Characterizations of one-way general quantum finite automata

    CERN Document Server

    Li, Lvzhou; Zou, Xiangfu; Li, Lvjun; Wu, Lihua

    2009-01-01

    In this paper we study a generalized model named one-way general quantum finite automata} (1gQFA), in which each symbol in the input alphabet induces a trace-preserving quantum operation, instead of a unitary transformation. Two different kinds of 1gQFA will be studied: measure-once one-way general quantum finite automata} (MO-1gQFA), and measure-many one-way general quantum finite automata (MM-1gQFA). We prove that MO-1gQFA can recognize all regular languages but only regular languages with bounded error. We prove that MM-1gQFA also recognize only regular languages with bounded error. Thus, MM-1gQFA and MO-1gQFA have the same language recognition power, which is greatly different from the conventional case in which the times of measurement performed in the computation generally affect the language recognition power of one-way QFA. Finally, we present a sufficient and necessary condition for two MM-1gQFA to be equivalent.

  8. Urban One-way Traffic Organization and Its Evaluation

    Institute of Scientific and Technical Information of China (English)

    裴玉龙; 伊新苗

    2004-01-01

    One-way traffic organization is a direct, efficient and economic method to solve traffic congestion and expand traffic capacity. With its evolution, advantages and disadvantages introduced its setting conditions demon strated. The general method and processes are summarized in planning for urban one-way streets project, viz. in vestigation, drawing out and evaluation of project, selecting of project and beneficial analysis. Fuzzy synthetical evaluation other fields is employed to evaluate the project. Its evaluation system and method is introduced and Delphi method is adopted to obtain evaluation index. Finally, taking Harbin city as an example, the application process of above-mentioned method is illuminated. Accordingly, it is proved that the method is exercisable.

  9. One-way quantum computing in the optical frequency comb.

    Science.gov (United States)

    Menicucci, Nicolas C; Flammia, Steven T; Pfister, Olivier

    2008-09-26

    One-way quantum computing allows any quantum algorithm to be implemented easily using just measurements. The difficult part is creating the universal resource, a cluster state, on which the measurements are made. We propose a scalable method that uses a single, multimode optical parametric oscillator (OPO). The method is very efficient and generates a continuous-variable cluster state, universal for quantum computation, with quantum information encoded in the quadratures of the optical frequency comb of the OPO.

  10. Nonreciprocity and one-way topological transitions in hyperbolic metamaterials

    Science.gov (United States)

    Leviyev, A.; Stein, B.; Christofi, A.; Galfsky, T.; Krishnamoorthy, H.; Kuskovsky, I. L.; Menon, V.; Khanikaev, A. B.

    2017-07-01

    Control of the electromagnetic waves in nano-scale structured materials is crucial to the development of next generation photonic circuits and devices. In this context, hyperbolic metamaterials, where elliptical isofrequency surfaces are morphed into surfaces with exotic hyperbolic topologies when the structure parameters are tuned, have shown unprecedented control over light propagation and interaction. Here we show that such topological transitions can be even more unusual when the hyperbolic metamaterial is endowed with nonreciprocity. Judicious design of metamaterials with reduced spatial symmetries, together with the breaking of time-reversal symmetry through magnetization, is shown to result in nonreciprocal dispersion and one-way topological phase transitions in hyperbolic metamaterials.

  11. One-way entangled-photon autocompensating quantum cryptography

    Science.gov (United States)

    Walton, Zachary D.; Abouraddy, Ayman F.; Sergienko, Alexander V.; Saleh, Bahaa E.; Teich, Malvin C.

    2003-06-01

    A quantum cryptography implementation is presented that uses entanglement to combine one-way operation with an autocompensating feature that has hitherto only been available in implementations that require the signal to make a round trip between the users. Using the concept of advanced waves, it is shown that this proposed implementation is related to the round-trip implementation in the same way that Ekert’s two-particle scheme is related to the original one-particle scheme of Bennett and Brassard. The practical advantages and disadvantages of the proposed implementation are discussed in the context of existing schemes.

  12. Simple Post Quantum Scheme for Higher Key Rate Multiparty Quantum Key Distribution

    Directory of Open Access Journals (Sweden)

    Abudhahir Buhari

    2012-10-01

    Full Text Available We propose a multi-party quantum key distribution protocol which enables all the receivers can converttheir respective private shared key into common secret key without use of entanglement. The maincomponent of our protocol is a simple post quantum scheme for achieving the higher secret key rate.Efficiency of the extracted key rate is almost 100%. We assume that sender established the pre-sharedprivate secret keys and a common secret number with the receivers. Our proposed scheme sends n stringsof number to n receivers in the public channel to convert their respective shared secret key into commonsecret key in the presence of Eve. We also analyze the complexity of attack by the adversary to guess thesecret key

  13. One way Doppler Extractor. Volume 2: Digital VCO technique

    Science.gov (United States)

    Nossen, E. J.; Starner, E. R.

    1974-01-01

    A feasibility analysis and trade-offs for a one-way Doppler extractor using digital VCO techniques is presented. The method of Doppler measurement involves the use of a digital phase lock loop; once this loop is locked to the incoming signal, the precise frequency and hence the Doppler component can be determined directly from the contents of the digital control register. The only serious error source is due to internally generated noise. Techniques are presented for minimizing this error source and achieving an accuracy of 0.01 Hz in a one second averaging period. A number of digitally controlled oscillators were analyzed from a performance and complexity point of view. The most promising technique uses an arithmetic synthesizer as a digital waveform generator.

  14. Acoustic topological insulator and robust one-way sound transport

    Science.gov (United States)

    He, Cheng; Ni, Xu; Ge, Hao; Sun, Xiao-Chen; Chen, Yan-Bin; Lu, Ming-Hui; Liu, Xiao-Ping; Chen, Yan-Feng

    2016-12-01

    Topological design of materials enables topological symmetries and facilitates unique backscattering-immune wave transport. In airborne acoustics, however, the intrinsic longitudinal nature of sound polarization makes the use of the conventional spin-orbital interaction mechanism impossible for achieving band inversion. The topological gauge flux is then typically introduced with a moving background in theoretical models. Its practical implementation is a serious challenge, though, due to inherent dynamic instabilities and noise. Here we realize the inversion of acoustic energy bands at a double Dirac cone and provide an experimental demonstration of an acoustic topological insulator. By manipulating the hopping interaction of neighbouring ’atoms’ in this new topological material, we successfully demonstrate the acoustic quantum spin Hall effect, characterized by robust pseudospin-dependent one-way edge sound transport. Our results are promising for the exploration of new routes for experimentally studying topological phenomena and related applications, for example, sound-noise reduction.

  15. One-way ANOVA based on interval information

    Science.gov (United States)

    Hesamian, Gholamreza

    2016-08-01

    This paper deals with extending the one-way analysis of variance (ANOVA) to the case where the observed data are represented by closed intervals rather than real numbers. In this approach, first a notion of interval random variable is introduced. Especially, a normal distribution with interval parameters is introduced to investigate hypotheses about the equality of interval means or test the homogeneity of interval variances assumption. Moreover, the least significant difference (LSD method) for investigating multiple comparison of interval means is developed when the null hypothesis about the equality of means is rejected. Then, at a given interval significance level, an index is applied to compare the interval test statistic and the related interval critical value as a criterion to accept or reject the null interval hypothesis of interest. Finally, the method of decision-making leads to some degrees to accept or reject the interval hypotheses. An applied example will be used to show the performance of this method.

  16. One-way steering of optical fields via dissipation of an atomic reservoir

    Science.gov (United States)

    Rao, Shi; Hu, Xiangming; Li, Lingchao; Xu, Jun

    2016-11-01

    Einstein-Podolsky-Rosen (EPR) steering as a form of quantum correlation lies between entanglement and Bell nonlocality and exhibits an inherent asymmetry between two observers. We study EPR steering of two fields, which are generated via four-wave mixing processes and are entangled with each other due to the dissipation of the atomic reservoir. It is shown that the one-way steering happens from one mode to the other for different cavity decay rates and not too small cooperation parameters. Depending on the adiabatic and nonadiabatic conditions, the one-way steering occurs in a different detuning region when the cooperation parameters are relatively small. An increase in the cooperation parameters leads to an increase both in the parameter region and in the degree for the one-way steering. Finally we generalize the present scheme to the cases of the bright and/or collective fields.

  17. One-way successive plate cross wedge rolling machine

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    In our last paper(Sci China Ser E-Tech Sci,2009,52(11):3117-3121) we designed the precision forming machine with rolling plate CWR(cross wedge rolling).This kind of machine colligates the advantages of high rigidity and small floor space for roller CWR machine and those of simple die manufacture and high precision for plate CWR machine.At the same time,it abandons the shortcomings of complex die manufacture and poor precision for roller CWR machine,and those of poor rigidity and large floor space for plate CWR machine.During rolling,the upper and lower rolling plates of the machine make reciprocating slide toward or away from each other,so the inertial forces should be overcome,which will cause great energy loss,besides,large floor space is needed when the rolled workpiece is large.In order to solve the above problems,this paper presents the one-way successive plate CWR machine,whose rolling plates need not make reciprocating slide.Hence,it has high energy utilization efficiency and production efficiency.Furthermore,the roll scale can be removed automatically.In particular,the machine can produce large axisymmetrical workpieces.

  18. A classical one-way function to confound quantum adversaries

    CERN Document Server

    Moore, Cristopher; Vazirani, U; Moore, Cristopher; Russell, Alexander; Vazirani, Umesh

    2007-01-01

    The promise of quantum computation and its consequences for complexity-theoretic cryptography motivates an immediate search for cryptosystems which can be implemented with current technology, but which remain secure even in the presence of quantum computers. Inspired by recent negative results pertaining to the nonabelian hidden subgroup problem, we present here a classical algebraic function $f_V(M)$ of a matrix $M$ which we believe is a one-way function secure against quantum attacks. Specifically, inverting $f_V$ reduces naturally to solving a hidden subgroup problem over the general linear group (which is at least as hard as the hidden subgroup problem over the symmetric group). We also demonstrate a reduction from Graph Isomorphism to the problem of inverting $f_V$; unlike Graph Isomorphism, however, the function $f_V$ is random self-reducible and therefore uniformly hard. These results suggest that, unlike Shor's algorithm for the discrete logarithm--which is, so far, the only successful quantum attack ...

  19. Key-rate enhancement using qutrit states for quantum key distribution with askew aligned sources

    Science.gov (United States)

    Jo, Yonggi; Son, Wonmin

    2016-11-01

    It is known that measurement-device-independent quantum key distribution (MDI-QKD) provides ultimate security from all types of side-channel attack on detectors at the expense of low key rate. In the present study, we propose MDI-QKD using three-dimensional quantum states and show that the protocol improves the secret key rate under the analysis of mismatched-basis statistics. Specifically, we analyze security of the 3 d -MDI-QKD protocol with askew aligned sources, meaning that the original sources contain unwanted states instead of the expected one. We evaluate the secret key rate of the protocol and identify the regime in which the key rate is higher than the protocol with the qubit MDI-QKD.

  20. Criteria of backscattering in chiral one-way photonic crystals

    Science.gov (United States)

    Cheng, Pi-Ju; Chang, Shu-Wei

    2016-03-01

    Optical isolators are important devices in photonic circuits. To reduce the unwanted reflection in a robust manner, several setups have been realized using nonreciprocal schemes. In this study, we show that the propagating modes in a strongly-guided chiral photonic crystal (no breaking of the reciprocity) are not backscattering-immune even though they are indeed insensitive to many types of scatters. Without the protection from the nonreciprocity, the backscattering occurs under certain circumstances. We present a perturbative method to calculate the backscattering of chiral photonic crystals in the presence of chiral/achiral scatters. The model is, essentially, a simplified analogy to the first-order Born approximation. Under reasonable assumptions based on the behaviors of chiral photonic modes, we obtained the expression of reflection coefficients which provides criteria for the prominent backscattering in such chiral structures. Numerical examinations using the finite-element method were also performed and the results agree well with the theoretical prediction. From both our theory and numerical calculations, we find that the amount of backscattering critically depends on the symmetry of scatter cross sections. Strong reflection takes place when the azimuthal Fourier components of scatter cross sections have an order l of 2. Chiral scatters without these Fourier components would not efficiently reflect the chiral photonic modes. In addition, for these chiral propagating modes, disturbances at the most significant parts of field profiles do not necessarily result in the most effective backscattering. The observation also reveals what types of scatters or defects should be avoided in one-way applications of chiral structures in order to minimize the backscattering.

  1. The Laguerre finite difference one-way equation solver

    Science.gov (United States)

    Terekhov, Andrew V.

    2017-05-01

    This paper presents a new finite difference algorithm for solving the 2D one-way wave equation with a preliminary approximation of a pseudo-differential operator by a system of partial differential equations. As opposed to the existing approaches, the integral Laguerre transform instead of Fourier transform is used. After carrying out the approximation of spatial variables it is possible to obtain systems of linear algebraic equations with better computing properties and to reduce computer costs for their solution. High accuracy of calculations is attained at the expense of employing finite difference approximations of higher accuracy order that are based on the dispersion-relationship-preserving method and the Richardson extrapolation in the downward continuation direction. The numerical experiments have verified that as compared to the spectral difference method based on Fourier transform, the new algorithm allows one to calculate wave fields with a higher degree of accuracy and a lower level of numerical noise and artifacts including those for non-smooth velocity models. In the context of solving the geophysical problem the post-stack migration for velocity models of the types Syncline and Sigsbee2A has been carried out. It is shown that the images obtained contain lesser noise and are considerably better focused as compared to those obtained by the known Fourier Finite Difference and Phase-Shift Plus Interpolation methods. There is an opinion that purely finite difference approaches do not allow carrying out the seismic migration procedure with sufficient accuracy, however the results obtained disprove this statement. For the supercomputer implementation it is proposed to use the parallel dichotomy algorithm when solving systems of linear algebraic equations with block-tridiagonal matrices.

  2. [Molecular basis of one-way serological reaction between SINV and XJ-160 virus].

    Science.gov (United States)

    Wang, Li-hua; Fu, Shi-hong; Yang, Yi-liang; Zhu, Wu-yang; Tang, Qing; Liang, Guo-dong

    2010-05-01

    The purpose of this study is to elucidate the molecular mechanism of one-way serological reaction between XJ-160 virus and SINV by recombinant viruses which exchanged the glycoprotein genes individually or simultaneously. Three recombinant viruses were obtained based on the whole-length infectious cDNA clone of XJ-160 virus. The infectivity and pathogenesis to BHK-21 cells and animals were studied and the gene which controlled this one-way serological reaction phenomenon was searched by MCPENT. The results showed that the E2 glycoprotein was the main factor which influenced the growth rate, plaque morphology and pathogenicity of BHK-21 cells and suckling mice. The results of MCPENT showed that the E2 glycoprotein of SINV played a major role in this one-way serological reaction phenomenon. Our study identified the SINE2 gene was the determined gene for one way serological reaction between XJ-160 virus and SINV, and this research laid the foundation for further analysis of the genomic structure and function of SINV.

  3. Experimental Realization of a One-way Quantum Computer Algorithm Solving Simon's Problem

    CERN Document Server

    Tame, M S; Di Franco, C; Wadsworth, W J; Rarity, J G

    2014-01-01

    We report an experimental demonstration of a one-way implementation of a quantum algorithm solving Simon's Problem - a black box period-finding problem which has an exponential gap between the classical and quantum runtime. Using an all-optical setup and modifying the bases of single-qubit measurements on a five-qubit cluster state, key representative functions of the logical two-qubit version's black box can be queried and solved. To the best of our knowledge, this work represents the first experimental realization of the quantum algorithm solving Simon's Problem. The experimental results are in excellent agreement with the theoretical model, demonstrating the successful performance of the algorithm. With a view to scaling up to larger numbers of qubits, we analyze the resource requirements for an n-qubit version. This work helps highlight how one-way quantum computing provides a practical route to experimentally investigating the quantum-classical gap in the query complexity model.

  4. Composite one-way transmission waveguide based on the curved metal slit and 1D photonic crystal

    Directory of Open Access Journals (Sweden)

    Qi Gao

    2016-10-01

    Full Text Available The one-way devices in optical circuits are the key components just as the diodes in electric circuits, which allow the light going in only one direction. A novel one-way transmission structure is proposed which is a curved waveguide containing a confined photonic crystal. When the waveguide is made of perfect electric conductor, the exact calculation results demonstrate that the device shows excellent one-way properties. The forward transmissivity approaches 100% and the largest transmission ratio exceeds 100.92N, where N is the cell number of the photonic crystal in the structure. When the waveguide is made of real metal, the device also presents excellent one-way transmission properties, which can be confirmed by an approximate calculation as well as by the simulation. In working region, the lowest forward tranmissivity is about 30% and the largest one exceeds 70%. The highest transmission ratio exceeds 104.

  5. Secret key rates for an encoded quantum repeater

    Science.gov (United States)

    Bratzik, Sylvia; Kampermann, Hermann; Bruß, Dagmar

    2014-03-01

    We investigate secret key rates for the quantum repeater using encoding [L. Jiang et al., Phys. Rev. A 79, 032325 (2009), 10.1103/PhysRevA.79.032325] and compare them to the standard repeater scheme by Briegel, Dür, Cirac, and Zoller. The former scheme has the advantage of a minimal consumption of classical communication. We analyze the trade-off in the secret key rate between the communication time and the required resources. For this purpose we introduce an error model for the repeater using encoding which allows for input Bell states with a fidelity smaller than one, in contrast to the model given by L. Jiang et al. [Phys. Rev. A 79, 032325 (2009), 10.1103/PhysRevA.79.032325]. We show that one can correct additional errors in the encoded connection procedure of this repeater and develop a suitable decoding algorithm. Furthermore, we derive the rate of producing entangled pairs for the quantum repeater using encoding and give the minimal parameter values (gate quality and initial fidelity) for establishing a nonzero secret key. We find that the generic quantum repeater is optimal regarding the secret key rate per memory per second and show that the encoded quantum repeater using the simple three-qubit repetition code can even have an advantage with respect to the resources compared to other recent quantum repeater schemes with encoding.

  6. Floodlight quantum key distribution: A practical route to gigabit-per-second secret-key rates

    Science.gov (United States)

    Zhuang, Quntao; Zhang, Zheshen; Dove, Justin; Wong, Franco N. C.; Shapiro, Jeffrey H.

    2016-07-01

    The channel loss incurred in long-distance transmission places a significant burden on quantum key distribution (QKD) systems: they must defeat a passive eavesdropper who detects all the light lost in the quantum channel and does so without disturbing the light that reaches the intended destination. The current QKD implementation with the highest long-distance secret-key rate meets this challenge by transmitting no more than one photon per bit [M. Lucamarini et al., Opt. Express 21, 24550 (2013), 10.1364/OE.21.024550]. As a result, it cannot achieve the Gbps secret-key rate needed for one-time pad encryption of large data files unless an impractically large amount of multiplexing is employed. We introduce floodlight QKD (FL-QKD), which floods the quantum channel with a high number of photons per bit distributed over a much greater number of optical modes. FL-QKD offers security against the optimum frequency-domain collective attack by transmitting less than one photon per mode and using photon-coincidence channel monitoring, and it is completely immune to passive eavesdropping. More importantly, FL-QKD is capable of a 2-Gbps secret-key rate over a 50-km fiber link, without any multiplexing, using available equipment, i.e., no new technology need be developed. FL-QKD achieves this extraordinary secret-key rate by virtue of its unprecedented secret-key efficiency, in bits per channel use, which exceeds those of state-of-the-art systems by two orders of magnitude.

  7. One-way hash function construction based on the spatiotemporal chaotic system

    Institute of Scientific and Technical Information of China (English)

    Luo Yu-Ling; Du Ming-Hui

    2012-01-01

    Based on the spatiotemporal chaotic system,a novel algorithm for constructing a one-way hash function is proposed and analysed.The message is divided into fixed length blocks.Each message block is processed by the hash compression function in parallel.The hash compression is constructed based on the spatiotemporal chaos.In each message block,the ASCII code and its position in the whole message block chain constitute the initial conditions and the key of the hash compression function.The final hash value is generated by further compressing the mixed result of all the hash compression values.Theoretic analyses and numerical simulations show that the proposed algorithm presents high sensitivity to the message and key,good statistical properties,and strong collision resistance.

  8. Exact Markov chain and approximate diffusion solution for haploid genetic drift with one-way mutation.

    Science.gov (United States)

    Hössjer, Ola; Tyvand, Peder A; Miloh, Touvia

    2016-02-01

    The classical Kimura solution of the diffusion equation is investigated for a haploid random mating (Wright-Fisher) model, with one-way mutations and initial-value specified by the founder population. The validity of the transient diffusion solution is checked by exact Markov chain computations, using a Jordan decomposition of the transition matrix. The conclusion is that the one-way diffusion model mostly works well, although the rate of convergence depends on the initial allele frequency and the mutation rate. The diffusion approximation is poor for mutation rates so low that the non-fixation boundary is regular. When this happens we perturb the diffusion solution around the non-fixation boundary and obtain a more accurate approximation that takes quasi-fixation of the mutant allele into account. The main application is to quantify how fast a specific genetic variant of the infinite alleles model is lost. We also discuss extensions of the quasi-fixation approach to other models with small mutation rates.

  9. Experimental realization of a one-way quantum computer algorithm solving Simon's problem.

    Science.gov (United States)

    Tame, M S; Bell, B A; Di Franco, C; Wadsworth, W J; Rarity, J G

    2014-11-14

    We report an experimental demonstration of a one-way implementation of a quantum algorithm solving Simon's problem-a black-box period-finding problem that has an exponential gap between the classical and quantum runtime. Using an all-optical setup and modifying the bases of single-qubit measurements on a five-qubit cluster state, key representative functions of the logical two-qubit version's black box can be queried and solved. To the best of our knowledge, this work represents the first experimental realization of the quantum algorithm solving Simon's problem. The experimental results are in excellent agreement with the theoretical model, demonstrating the successful performance of the algorithm. With a view to scaling up to larger numbers of qubits, we analyze the resource requirements for an n-qubit version. This work helps highlight how one-way quantum computing provides a practical route to experimentally investigating the quantum-classical gap in the query complexity model.

  10. Relay Selection and Resource Allocation in One-Way and Two-Way Cognitive Relay Networks

    KAUST Repository

    Alsharoa, Ahmad M.

    2013-05-08

    In this work, the problem of relay selection and resource power allocation in one- way and two-way cognitive relay networks using half duplex channels with different relaying protocols is investigated. Optimization problems for both single and multiple relay selection that maximize the sum rate of the secondary network without degrading the quality of service of the primary network by respecting a tolerated interference threshold were formulated. Single relay selection and optimal power allocation for two-way relaying cognitive radio networks using decode-and-forward and amplify-and-forward protocols were studied. Dual decomposition and subgradient methods were used to find the optimal power allocation. The transmission process to exchange two different messages between two transceivers for two-way relaying technique takes place in two time slots. In the first slot, the transceivers transmit their signals simultaneously to the relay. Then, during the second slot the relay broadcasts its signal to the terminals. Moreover, improvement of both spectral and energy efficiency can be achieved compared with the one-way relaying technique. As an extension, a multiple relay selection for both one-way and two-way relaying under cognitive radio scenario using amplify-and-forward were discussed. A strong optimization tool based on genetic and iterative algorithms was employed to solve the 
formulated optimization problems for both single and multiple relay selection, where discrete relay power levels were considered. Simulation results show that the practical and low-complexity heuristic approaches achieve almost the same performance of the optimal relay selection schemes either with discrete or continuous power distributions while providing a considerable saving in terms of computational complexity.

  11. Sample size calculation for microarray experiments with blocked one-way design

    Directory of Open Access Journals (Sweden)

    Jung Sin-Ho

    2009-05-01

    Full Text Available Abstract Background One of the main objectives of microarray analysis is to identify differentially expressed genes for different types of cells or treatments. Many statistical methods have been proposed to assess the treatment effects in microarray experiments. Results In this paper, we consider discovery of the genes that are differentially expressed among K (> 2 treatments when each set of K arrays consists of a block. In this case, the array data among K treatments tend to be correlated because of block effect. We propose to use the blocked one-way ANOVA F-statistic to test if each gene is differentially expressed among K treatments. The marginal p-values are calculated using a permutation method accounting for the block effect, adjusting for the multiplicity of the testing procedure by controlling the false discovery rate (FDR. We propose a sample size calculation method for microarray experiments with a blocked one-way design. With FDR level and effect sizes of genes specified, our formula provides a sample size for a given number of true discoveries. Conclusion The calculated sample size is shown via simulations to provide an accurate number of true discoveries while controlling the FDR at the desired level.

  12. Analysis of one-way laser ranging data to LRO, time transfer and clock characterization

    Science.gov (United States)

    Bauer, S.; Hussmann, H.; Oberst, J.; Dirkx, D.; Mao, D.; Neumann, G. A.; Mazarico, E.; Torrence, M. H.; McGarry, J. F.; Smith, D. E.; Zuber, M. T.

    2017-02-01

    We processed and analyzed one-way laser ranging data from International Laser Ranging Service ground stations to NASA's Lunar Reconnaissance Orbiter (LRO), obtained from June 13, 2009 until September 30, 2014. We pair and analyze the one-way range observables from station laser fire and spacecraft laser arrival times by using nominal LRO orbit models based on the GRAIL gravity field. We apply corrections for instrument range walk, as well as for atmospheric and relativistic effects. In total we derived a tracking data volume of ≈ 3000 hours featuring 64 million Full Rate and 1.5 million Normal Point observations. From a statistical analysis of the dataset we evaluate the experiment and the ground station performance. We observe a laser ranging measurement precision of 12.3 cm in case of the Full Rate data which surpasses the LOLA timestamp precision of 15 cm. The averaging to Normal Point data further reduces the measurement precision to 5.6 cm. We characterized the LRO clock with fits throughout the mission time and estimated the rate to 6.9 × 10-8, the aging to 1.6 × 10-12/day and the change of aging to 2.3 × 10-14 /day2over all mission phases. The fits also provide referencing of onboard time to the TDB time scale at a precision of 166 ns over two and 256 ns over all mission phases, representing ground to space time transfer. Furthermore we measure ground station clock differences from the fits as well as from simultaneous passes which we use for ground to ground time transfer from common view observations. We observed relative offsets ranging from 33 to 560 ns and relative rates ranging from 2 × 10-13 to 6 × 10-12 between the ground station clocks during selected mission phases. We study the results from the different methods and discuss their applicability for time transfer.

  13. Demonstration of orbit determination for the Lunar Reconnaissance Orbiter using one-way laser ranging data

    Science.gov (United States)

    Bauer, S.; Hussmann, H.; Oberst, J.; Dirkx, D.; Mao, D.; Neumann, G. A.; Mazarico, E.; Torrence, M. H.; McGarry, J. F.; Smith, D. E.; Zuber, M. T.

    2016-09-01

    We used one-way laser ranging data from International Laser Ranging Service (ILRS) ground stations to NASA's Lunar Reconnaissance Orbiter (LRO) for a demonstration of orbit determination. In the one-way setup, the state of LRO and the parameters of the spacecraft and all involved ground station clocks must be estimated simultaneously. This setup introduces many correlated parameters that are resolved by using a priori constraints. Moreover the observation data coverage and errors accumulating from the dynamical and the clock modeling limit the maximum arc length. The objective of this paper is to investigate the effect of the arc length, the dynamical and modeling accuracy and the observation data coverage on the accuracy of the results. We analyzed multiple arcs using lengths of 2 and 7 days during a one-week period in Science Mission phase 02 (SM02, November 2010) and compared the trajectories, the post-fit measurement residuals and the estimated clock parameters. We further incorporated simultaneous passes from multiple stations within the observation data to investigate the expected improvement in positioning. The estimated trajectories were compared to the nominal LRO trajectory and the clock parameters (offset, rate and aging) to the results found in the literature. Arcs estimated with one-way ranging data had differences of 5-30 m compared to the nominal LRO trajectory. While the estimated LRO clock rates agreed closely with the a priori constraints, the aging parameters absorbed clock modeling errors with increasing clock arc length. Because of high correlations between the different ground station clocks and due to limited clock modeling accuracy, their differences only agreed at the order of magnitude with the literature. We found that the incorporation of simultaneous passes requires improved modeling in particular to enable the expected improvement in positioning. We found that gaps in the observation data coverage over 12 h (≈6 successive LRO orbits

  14. Two-factor authentication system based on optical interference and one-way hash function

    Science.gov (United States)

    He, Wenqi; Peng, Xiang; Meng, Xiangfeng; Liu, Xiaoli

    2012-10-01

    We present a two-factor authentication method to verify the personal identification who tries to access an optoelectronic system. This method is based on the optical interference principle and the traditional one-way Hash function (e.g. MD5). The authentication process is straightforward, the phase key and the password-controlled phase lock of one user are loading on two Spatial Light Modulators (SLMs) in advance, by which two coherent beams are modulated and then interference with each other at the output plane leading to an output image. By comparing the output image with all the standard certification images in the database, the system can thus verify the user's identity. However, the system designing process involves an iterative Modified Phase Retrieval Algorithm (MPRA). For an uthorized user, a phase lock is first created based on a "Digital Fingerprint (DF)", which is the result of a Hash function on a preselected user password. The corresponding phase key can then be determined by use of the phase lock and a designated standard certification image. Note that the encode/design process can only be realized by digital means while the authentication process could be achieved digitally or optically. Computer simulations were also given to validate the proposed approach.

  15. Multisymplectic Hsmiltonian Formulation for a One-Way Seismic Wave Equation of High-Order Approximation

    Institute of Scientific and Technical Information of China (English)

    陈景波

    2004-01-01

    Based on the Lagrangian density and covariant Legendre transform, we obtain the multisymplectic Hamiltonian formulation for a one-way seismic wave equation of high-order approximation. This formulation provides a new perspective for studying the one-way seismic wave equation. A multisymplectic integrator is also derived.

  16. On the Experimental Determination of the One-Way Speed of Light

    Science.gov (United States)

    Perez, Israel

    2011-01-01

    In this paper the question of the isotropy of the one-way speed of light is addressed from an experimental perspective. In particular, we analyse two experimental methods commonly used in its determination. The analysis is aimed at clarifying the view that the one-way speed of light cannot be determined by techniques in which physical entities…

  17. A pseudodifferential equation with damping for one-way wave propagation in inhomogeneous acoustic media

    NARCIS (Netherlands)

    Stolk, C.C.

    2004-01-01

    A one-way wave equation is an evolution equation in one of the space directions that describes (approximately) a wave field. The exact wave field is approximated in a high frequency, microlocal sense. Here we derive the pseudodifferential one-way wave equation for an inhomogeneous acoustic medium us

  18. Comment on "One-way deficit of two qubit X states"

    Science.gov (United States)

    Jing, Naihuan; Zhang, Xia; Wang, Yao-Kun

    2015-12-01

    We improve the recent method of Wang et. al to calculate exactly the one-way information deficit of any X-state. Analytical formulas of the one-way information deficit are given for several nontrivial regions of the parameters.

  19. The one-way quantum computer - a non-network model of quantum computation

    CERN Document Server

    Raussendorf, R; Briegel, H J; Raussendorf, Robert; Browne, Daniel E.; Briegel, Hans J.

    2001-01-01

    A one-way quantum computer works by only performing a sequence of one-qubit measurements on a particular entangled multi-qubit state, the cluster state. No non-local operations are required in the process of computation. Any quantum logic network can be simulated on the one-way quantum computer. On the other hand, the network model of quantum computation cannot explain all ways of processing quantum information possible with the one-way quantum computer. In this paper, two examples of the non-network character of the one-way quantum computer are given. First, circuits in the Clifford group can be performed in a single time step. Second, the realisation of a particular circuit --the bit-reversal gate-- on the one-way quantum computer has no network interpretation. (Submitted to J. Mod. Opt, Gdansk ESF QIT conference issue.)

  20. Nonlinear behavior analysis of spur gear pairs with a one-way clutch

    Science.gov (United States)

    Gill-Jeong, Cheon

    2007-04-01

    Nonlinear behavior analysis of a paired spur gear system with a one-way clutch was used to verify whether a one-way clutch is effective for reducing torsional vibration. The dynamic responses were studied over a wide frequency range by speed sweeping to check the nonlinear behavior using numerical integration. The gear system with a one-way clutch showed typical nonlinear behavior, such as softening nonlinearity and jump phenomena. The oscillating component of the dynamic transmission error was reduced over the entire frequency range compared to a system without a one-way clutch, and double-side contact could be prevented, even with very small backlash. Installing a one-way clutch on both sides of the gear system was more effective at mitigating the negative effects of various parameter changes than installing one only on the input or output side.

  1. One-way membrane trafficking of SOS in receptor-triggered Ras activation.

    Science.gov (United States)

    Christensen, Sune M; Tu, Hsiung-Lin; Jun, Jesse E; Alvarez, Steven; Triplet, Meredith G; Iwig, Jeffrey S; Yadav, Kamlesh K; Bar-Sagi, Dafna; Roose, Jeroen P; Groves, Jay T

    2016-09-01

    SOS is a key activator of the small GTPase Ras. In cells, SOS-Ras signaling is thought to be initiated predominantly by membrane recruitment of SOS via the adaptor Grb2 and balanced by rapidly reversible Grb2-SOS binding kinetics. However, SOS has multiple protein and lipid interactions that provide linkage to the membrane. In reconstituted-membrane experiments, these Grb2-independent interactions were sufficient to retain human SOS on the membrane for many minutes, during which a single SOS molecule could processively activate thousands of Ras molecules. These observations raised questions concerning how receptors maintain control of SOS in cells and how membrane-recruited SOS is ultimately released. We addressed these questions in quantitative assays of reconstituted SOS-deficient chicken B-cell signaling systems combined with single-molecule measurements in supported membranes. These studies revealed an essentially one-way trafficking process in which membrane-recruited SOS remains trapped on the membrane and continuously activates Ras until being actively removed via endocytosis.

  2. One-way optical transmission in silicon photonic crystal heterojunction with circular and square scatterers

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Dan, E-mail: liudanhu725@126.com [School of Physics and Mechanical & Electrical Engineering, Hubei University of Education, Wuhan, 430205 (China); Hu, Sen [School of Physics and Mechanical & Electrical Engineering, Hubei University of Education, Wuhan, 430205 (China); Gao, Yihua [Wuhan National Laboratory for Optoelectronics (WNLO), School of Physics, Huazhong University of Science and Technology (HUST), Wuhan, 430074 (China)

    2017-07-12

    A 2D orthogonal square-lattice photonic crystal (PC) heterojunction consisting of circular and square air holes in silicon is presented. Band structures are calculated using the plane wave expansion method, and the transmission properties are investigated by the finite-different time-domain simulations. Thanks to the higher diffraction orders excited when the circular and square holes are interlaced along the interface, one-way transmission phenomena can exist within wide frequency regions. The higher order diffraction is further enhanced through two different interface optimization designs proposed by modifying the PC structure of the hetero-interface. An orthogonal PC heterojunction for wide-band and efficient one-way transmission is constructed, and the maximum transmissivity is up to 78%. - Highlights: • Photonic crystal heterojunction with circular and square scatterers is first studied. • One-way transmission efficiency is closely related to the hetero-interface. • Wide-band and efficient one-way transmission is realized.

  3. Leading by words: A voluntary contribution experiment with one-way communication

    OpenAIRE

    Koukoumelis, Anastasios; Levati, Maria Vittoria; Weisser, Johannes

    2009-01-01

    In this paper, we study a voluntary contribution mechanism with one-way communication. The relevance of one person's words is assessed by assigning exogenously the role of the "communicator" to one group member. Contrary to the view that the mutual exchange of promises is necessary for the cooperation-enhancing effect of communication, we ï¬ nd that, compared to a standard voluntary contribution mechanism with no communication, one-way communication signiï¬ cantly increases contributions and ...

  4. Analysis of the circular track experiment measuring the one-way speed of light

    OpenAIRE

    Philip, Evan John

    2012-01-01

    All experiments attempting to verify the invariance of speed of light directly are based on two-way speed measurement. The challenge in one-way speed measurement, the requirement of spatially separated synchronised clocks, can be possibly circumvented by measuring the speed of light travelling in a closed path. An apparent violation of the invariance principle has been recently reported in the first experiment attempting to measure the one-way speed of light utilising this concept. This exper...

  5. Moments Based Framework for Performance Analysis of One-Way/Two-Way CSI-Assisted AF Relaying

    KAUST Repository

    Xia, Minghua

    2012-09-01

    When analyzing system performance of conventional one-way relaying or advanced two-way relaying, these two techniques are always dealt with separately and, thus, their performance cannot be compared efficiently. Moreover, for ease of mathematical tractability, channels considered in such studies are generally assumed to be subject to Rayleigh fading or to be Nakagami-$m$ channels with integer fading parameters, which is impractical in typical urban environments. In this paper, we propose a unified moments-based framework for general performance analysis of channel-state-information (CSI) assisted amplify-and-forward (AF) relaying systems. The framework is applicable to both one-way and two-way relaying over arbitrary Nakagami-$m$ fading channels, and it includes previously reported results as special cases. Specifically, the mathematical framework is firstly developed under the umbrella of the weighted harmonic mean of two Gamma-distributed variables in conjunction with the theory of Pad\\\\\\'e approximants. Then, general expressions for the received signal-to-noise ratios of the users in one-way/two-way relaying systems and the corresponding moments, moment generation function, and cumulative density function are established. Subsequently, the mathematical framework is applied to analyze, compare, and gain insights into system performance of one-way and two-way relaying techniques, in terms of outage probability, average symbol error probability, and achievable data rate. All analytical results are corroborated by simulation results as well as previously reported results whenever available, and they are shown to be efficient tools to evaluate and compare system performance of one-way and two-way relaying.

  6. Application of simple array method in one-way traffic synthetic asessment

    Institute of Scientific and Technical Information of China (English)

    PEI Yu-long; LIU Guang-ping

    2005-01-01

    One-Way Traffic synthetic assessing can not only determine the assessment method, but can also provide an opportunity for further study of road systems. Comparing three Road Traffic Planning methods, which are Value Analysis method, Simple Array method and Step Analysis method, this paper concludes that Simple Array method has one prominent merit, avoiding the complicated relationship of various factors and simplifying the complex problem. Therefore Simple Array method is firstly presented in this paper to be the assessing measure to assess the One-Way Traffic Planning project. Although this assessing method cannot wholly give way to man's will, through consistently testing on qualitative factors and with the decision-making results of a multiprogram, this method is still an effective method. Using an example of Harbin One-Way Traffic planning, with seven assessing indexes including economic benefit index, Simple Array method is applied to synthetically assessing the program. This fully reflects the general function of One-Way Traffic planning program and objectively evaluates the program. It also proves that, as the method of One-Way Traffic synthetic assessing, Simple Array method is rational and practical.

  7. Verbal communication with the Blom low profile and Passy-Muir one-way tracheotomy tube speaking valves.

    Science.gov (United States)

    Adam, Stewart I; Srinet, Prateek; Aronberg, Ryan M; Rosenberg, Graeme; Leder, Steven B

    2015-01-01

    To investigate physiologic parameters, voice production abilities, and functional verbal communication ratings of the Blom low profile voice inner cannula and Passy-Muir one-way tracheotomy tube speaking valves. Case series with planned data collection. Large, urban, tertiary care teaching hospital. Referred sample of 30 consecutively enrolled adults requiring a tracheotomy tube and tested with Blom and Passy-Muir valves. Physiologic parameters recorded were oxygen saturation, respiration rate, and heart rate. Voice production abilities included maximum voice intensity in relation to ambient room noise and maximum phonation duration of the vowel/a/. Functional verbal communication was determined from randomized and blinded listener ratings of counting 1-10, saying the days of the week, and reading aloud the sentence, "There is according to legend a boiling pot of gold at one end." There were no significant differences (p>0.05) between the Blom and Passy-Muir valves for the physiologic parameters of oxygen saturation, respiration rate, and heart rate; voice production abilities of both maximum intensity and duration of/a/; and functional verbal communication ratings. Both valves allowed for significantly greater maximum voice intensity over ambient room noise (pspeaking valves exhibited equipoise regarding patient physiologic parameters, voice production abilities, and functional verbal communication ratings. Readers will understand the importance of verbal communication for patients who require a tracheotomy tube; will be able to determine the differences between the Blom low profile voice inner cannula and Passy-Muir one-way tracheotomy tube speaking valves; and will be confident in knowing that both the Blom and Passy-Muir one-way tracheotomy tube speaking valves are equivalent regarding physiological functioning and speech production abilities. Copyright © 2015 Elsevier Inc. All rights reserved.

  8. Quantum de Finetti Theorem under Fully-One-Way Adaptive Measurements

    Science.gov (United States)

    Li, Ke; Smith, Graeme

    2015-04-01

    We prove a version of the quantum de Finetti theorem: permutation-invariant quantum states are well approximated as a probabilistic mixture of multifold product states. The approximation is measured by distinguishability under measurements that are implementable by fully-one-way local operations and classical communication (LOCC). Our result strengthens Brandão and Harrow's de Finetti theorem where a kind of partially-one-way LOCC measurements was used for measuring the approximation, with essentially the same error bound. As main applications, we show (i) a quasipolynomial-time algorithm which detects multipartite entanglement with an amount larger than an arbitrarily small constant (measured with a variant of the relative entropy of entanglement), and (ii) a proof that in quantum Merlin-Arthur proof systems, polynomially many provers are not more powerful than a single prover when the verifier is restricted to one-way LOCC operations.

  9. One-way helical electromagnetic wave propagation supported by magnetized plasma

    CERN Document Server

    Yang, Biao; Gao, Wenlong; Guo, Qinghua; Zhang, Shuang

    2014-01-01

    In this paper we reveal the presence of photonic one-way helical surface states in a simple natural system - magnetized plasma. The application of an external magnetic field to a bulk plasma body not only breaks time-reversal-symmetry but also leads to separation of Equi-Frequency Contour surfaces (EFCs) to form topologically nontrivial gaps in k space. Interestingly, these EFCs support topologically protected surface states. We numerically investigate an interface between magnetized plasma, using a realistic model for parameter dispersion, and vacuum, to confirm the existence of one-way scatter-immune helical surface states. Unlike previous proposals for achieving photonic one-way propagation, our scheme does not require the use of artificial structures and should therefore be simple to implement experimentally.

  10. One-way quantum deficit and quantum coherence in the anisotropic XY chain

    Science.gov (United States)

    Ye, Biao-Liang; Li, Bo; Zhao, Li-Jun; Zhang, Hai-Jun; Fei, Shao-Ming

    2017-03-01

    In this study, we investigate pairwise non-classical correlations measured using a one-way quantum deficit as well as quantum coherence in the XY spin-1/2 chain in a transverse magnetic field for both zero and finite temperatures. The analytical and numerical results of our investigations are presented. In the case when the temperature is zero, it is shown that the one-way quantum deficit can characterize quantum phase transitions as well as quantum coherence. We find that these measures have a clear critical point at λ = 1. When λ ≤ 1, the one-way quantum deficit has an analytical expression that coincides with the relative entropy of coherence. We also study an XX model and an Ising chain at the finite temperatures.

  11. Performance Analysis of a Forecasting Relocation Model for One-Way Carsharing

    Directory of Open Access Journals (Sweden)

    Ganjar Alfian

    2017-06-01

    Full Text Available A carsharing service can be seen as a transport alternative between private and public transport that enables a group of people to share vehicles based at certain stations. The advanced carsharing service, one-way carsharing, enables customers to return the car to another station. However, one-way implementation generates an imbalanced distribution of cars in each station. Thus, this paper proposes forecasting relocation to solve car distribution imbalances for one-way carsharing services. A discrete event simulation model was developed to help evaluate the proposed model performance. A real case dataset was used to find the best simulation result. The results provide a clear insight into the impact of forecasting relocation on high system utilization and the reservation acceptance ratio compared to traditional relocation methods.

  12. Three-dimensional study of a one-way, flexible magnetorheological elastomer-based micro fluid transport system

    Science.gov (United States)

    Behrooz, Majid; Gordaninejad, Faramarz

    2016-09-01

    This paper presents a three-dimensional study of a controllable flexible magnetically-activated micropump. The tubular micropump employs magnetically induced deformation of magnetorheological elastomer and one-way flexible conical valves for fluid transport. Three-dimensional magneto-fluid-solid interaction analysis is employed to investigate the performance of the system. The effects of key material, geometric, and magnetic parameters on the effectiveness of the system are examined. It is demonstrated that the proposed system can propel the fluid unidirectionally, and the volume of the transported fluid is significantly affected by some of the design parameters.

  13. Joint Preprocesser-Based Detectors for One-Way and Two-Way Cooperative Communication Networks

    KAUST Repository

    Abuzaid, Abdulrahman I.

    2014-05-01

    Efficient receiver designs for cooperative communication networks are becoming increasingly important. In previous work, cooperative networks communicated with the use of L relays. As the receiver is constrained, channel shortening and reduced-rank techniques were employed to design the preprocessing matrix that reduces the length of the received vector from L to U. In the first part of the work, a receiver structure is proposed which combines our proposed threshold selection criteria with the joint iterative optimization (JIO) algorithm that is based on the mean square error (MSE). Our receiver assists in determining the optimal U. Furthermore, this receiver provides the freedom to choose U for each frame depending on the tolerable difference allowed for MSE. Our study and simulation results show that by choosing an appropriate threshold, it is possible to gain in terms of complexity savings while having no or minimal effect on the BER performance of the system. Furthermore, the effect of channel estimation on the performance of the cooperative system is investigated. In the second part of the work, a joint preprocessor-based detector for cooperative communication networks is proposed for one-way and two-way relaying. This joint preprocessor-based detector operates on the principles of minimizing the symbol error rate (SER) instead of minimizing MSE. For a realistic assessment, pilot symbols are used to estimate the channel. From our simulations, it can be observed that our proposed detector achieves the same SER performance as that of the maximum likelihood (ML) detector with all participating relays. Additionally, our detector outperforms selection combining (SC), channel shortening (CS) scheme and reduced-rank techniques when using the same U. Finally, our proposed scheme has the lowest computational complexity.

  14. Bending self-collimated one-way light by using gyromagnetic photonic crystals

    Energy Technology Data Exchange (ETDEWEB)

    Li, Qing-Bo [School of Electronic Sciences and Engineering, Nanjing University, Nanjing 210093 (China); Jiangsu Key Construction Laboratory of Modern Measurement Technology and Intelligent System, Huaiyin Normal University, Huaian 223300 (China); Li, Zhen; Wu, Rui-xin, E-mail: rxwu@nju.edu.cn [School of Electronic Sciences and Engineering, Nanjing University, Nanjing 210093 (China)

    2015-12-14

    We theoretically demonstrate that electromagnetic waves can self-collimate and propagate unidirectionally in photonic crystals fabricated using semicylindrical ferrite rods in magnetized states. The parity and time-reversal symmetries of such photonic crystals are broken, resulting in a self-collimated one-way body wave within the photonic crystals. By applying the bias magnetic field in a complex configuration, the self-collimated one-way wave beam can be bent into arbitrary trajectories within the photonic crystal, providing an avenue for controlling wave beams.

  15. Study of the one-way speed of light anisotropy with particle beams

    Energy Technology Data Exchange (ETDEWEB)

    Wojtsekhowski, Bogdan [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States)

    2017-04-01

    Concepts of high precision studies of the one-way speed of light anisotropy are discussed. The high energy particle beam allows measurement of a one-way speed of light anisotropy (SOLA) via analysis of the beam momentum variation with sidereal phase without the use of synchronized clocks. High precision beam position monitors could provide accurate monitoring of the beam orbit and determination of the particle beam momentum with relative accuracy on the level of 10^-10, which corresponds to a limit on SOLA of 10^-18 with existing storage rings. A few additional versions of the experiment are also presented.

  16. Complex spatiotemporal behavior in a chain of one-way nonlinearly coupled elements

    DEFF Research Database (Denmark)

    Gaididei, Yuri Borisovich; Berkemer, Rainer; Gorria, C.;

    2011-01-01

    The dynamics of asymmetrically coupled nonlinear elements is considered. It is shown that there are two distinctive regimes of oscillatory behavior of one-way nonlinearly coupled elements depending on the relaxation time and the strength of the coupling. In the subcritical regime when...... nonlinear model....

  17. Perceptual shrinkage of a one-way motion path with high-speed motion.

    Science.gov (United States)

    Nakajima, Yutaka; Sakaguchi, Yutaka

    2016-07-28

    Back-and-forth motion induces perceptual shrinkage of the motion path, but such shrinkage is hardly perceived for one-way motion. If the shrinkage is caused by temporal averaging of stimulus position around the endpoints, it should also be induced for one-way motion at higher motion speeds. In psychophysical experiments with a high-speed projector, we tested this conjecture for a one-way motion stimulus at various speeds (4-100 deg/s) along a straight path. Results showed that perceptual shrinkage of the motion path was robustly observed in higher-speed motion (faster than 66.7 deg/s). In addition, the amount of the forwards shift at the onset position was larger than that of the backwards shift at the offset position. These results demonstrate that high-speed motion can induce shrinkage, even for a one-way motion path. This can be explained by the view that perceptual position is represented by the integration of the temporal average of instantaneous position and the motion representation.

  18. Security analysis of a one-way hash function based on spatiotemporal chaos

    Institute of Scientific and Technical Information of China (English)

    Wang Shi-Hong; Shan Peng-Yang

    2011-01-01

    The collision and statistical properties of a one-way hash function based on spatiotemporal chaos are investigated Analysis and simulation results indicate that collisions exist in the original algorithm and,therefore,the original algorithm is insecure and vulnerable. An improved algorithm is proposed to avoid the collisions.

  19. One-way Penetration of the Boundary Wave in Anisotropic Structures

    Directory of Open Access Journals (Sweden)

    A.D. Arkhipov

    2012-06-01

    Full Text Available One-way penetration of the boundary wave in single-layer and multilayer anisotropic structures is investigated. We show that the conditions for minimal wave reflection from one side and full wave reflection from another side of the structure are possible. No conversation of polarization can be obtained for the considered effect.

  20. Quantitative Comparison of Three Standardization Methods Using a One-Way ANOVA for Multiple Mean Comparisons

    Science.gov (United States)

    Barrows, Russell D.

    2007-01-01

    A one-way ANOVA experiment is performed to determine whether or not the three standardization methods are statistically different in determining the concentration of the three paraffin analytes. The laboratory exercise asks students to combine the three methods in a single analytical procedure of their own design to determine the concentration of…

  1. Spatiotemporal quasiperiodicity transition to chaos in the one-way coupled bistability lattice system

    Institute of Scientific and Technical Information of China (English)

    杨世平; 田钢; 屈进禄; 徐树山

    1999-01-01

    One-way coupled optical bnstability lattice (OCBL) system for open flow is investigated. By using numerical simulations spatiotemporal quasiperiodicity is found. A rough phase diagram indicating the main spatiotemporal dynamic behavior in weakly coupled lattice is given. The transitions between spatiotemporal quasiperiodicity and chaos are observed. This result is important for the understanding of turbulence.

  2. Developing English and Spanish Literacy in a One-Way Spanish Immersion Program

    Science.gov (United States)

    Hollingsworth, Lindsay Kay

    2013-01-01

    This quantitative, causal-comparative study examined the possible cause and effect relationship between educational programming, specifically one-way Spanish immersion and traditional English-only, and native English-speaking fifth graders' vocabulary and reading comprehension. Archival data was used to examine students' reading achievement as…

  3. Teaching Principles of One-Way Analysis of Variance Using M&M's Candy

    Science.gov (United States)

    Schwartz, Todd A.

    2013-01-01

    I present an active learning classroom exercise illustrating essential principles of one-way analysis of variance (ANOVA) methods. The exercise is easily conducted by the instructor and is instructive (as well as enjoyable) for the students. This is conducive for demonstrating many theoretical and practical issues related to ANOVA and lends itself…

  4. Role of syndrome information on a one-way quantum repeater using teleportation-based error correction

    Science.gov (United States)

    Namiki, Ryo; Jiang, Liang; Kim, Jungsang; Lütkenhaus, Norbert

    2016-11-01

    We investigate a quantum repeater scheme for quantum key distribution based on the work by S. Muralidharan et al. [Phys. Rev. Lett. 112, 250501 (2014)], 10.1103/PhysRevLett.112.250501. Our scheme extends that work by making use of error syndrome measurement outcomes available at the repeater stations. We show how to calculate the secret key rates for the case of optimizing the syndrome information, while the known key rate is based on a scenario of coarse graining the syndrome information. We show that these key rates can surpass the Pirandola-Laurenza-Ottaviani-Banchi bound on secret key rates of direct transmission over lossy bosonic channels.

  5. Acoustic one-way mode conversion and transmission by sonic crystal waveguides

    CERN Document Server

    Ouyang, Shiliang; He, Zhaojian; Deng, Ke; Zhao, Heping

    2016-01-01

    We proposed a scheme to achieve one-way acoustic propagation and even odd mode switching in two mutually perpendicular sonic crystal waveguides connected by a resonant cavity. The even mode in the entrance waveguide is able to switch to odd mode in the exit waveguide through a symmetry match between the cavity resonant modes and the waveguide modes. Conversely, the odd mode in the exit waveguide is unable to be converted into the even mode in the entrance waveguide as incident waves and eigenmodes are mismatched in their symmetries at the waveguide exit. This one way mechanism can be applied to design an acoustic diode for acoustic integration devices and can be used as a convertor of the acoustic waveguide modes.

  6. Longitudinal chirality, enhanced non-reciprocity, and nano-scale planar one-way guiding

    CERN Document Server

    Mazor, Yarden

    2012-01-01

    When a linear chain of plasmonic nano-particles is exposed to a transverse DC magnetic field, the chain modes are elliptically polarized, in a single plane parallel to the chain axis; hence, a novel longitudinal plasmon-rotation is created. If, in addition, the chain geometry possesses longitudinal rotation, e.g. by using ellipsoidal particles that rotate in the same plane as the plasmon rotation, strong non-reciprocity is created. The structure possesses a new kind of chirality--the longitudinal chirality--and supports one-way guiding. Since all particles rotate in the same plane, the geometry is planar and can be fabricated by printing leaf-like patches on a single plane. Furthermore, the magnetic field is significantly weaker than in previously reported one-way guiding structures. These properties are examined for ideal (lossless) and for lossy chains.

  7. One-way optical transmission in silicon photonic crystal heterojunction with circular and square scatterers

    Science.gov (United States)

    Liu, Dan; Hu, Sen; Gao, Yihua

    2017-07-01

    A 2D orthogonal square-lattice photonic crystal (PC) heterojunction consisting of circular and square air holes in silicon is presented. Band structures are calculated using the plane wave expansion method, and the transmission properties are investigated by the finite-different time-domain simulations. Thanks to the higher diffraction orders excited when the circular and square holes are interlaced along the interface, one-way transmission phenomena can exist within wide frequency regions. The higher order diffraction is further enhanced through two different interface optimization designs proposed by modifying the PC structure of the hetero-interface. An orthogonal PC heterojunction for wide-band and efficient one-way transmission is constructed, and the maximum transmissivity is up to 78%.

  8. Quantum error correcting codes and one-way quantum computing: Towards a quantum memory

    CERN Document Server

    Schlingemann, D

    2003-01-01

    For realizing a quantum memory we suggest to first encode quantum information via a quantum error correcting code and then concatenate combined decoding and re-encoding operations. This requires that the encoding and the decoding operation can be performed faster than the typical decoherence time of the underlying system. The computational model underlying the one-way quantum computer, which has been introduced by Hans Briegel and Robert Raussendorf, provides a suitable concept for a fast implementation of quantum error correcting codes. It is shown explicitly in this article is how encoding and decoding operations for stabilizer codes can be realized on a one-way quantum computer. This is based on the graph code representation for stabilizer codes, on the one hand, and the relation between cluster states and graph codes, on the other hand.

  9. Observation of Genuine One-Way Einstein-Podolsky-Rosen Steering

    Science.gov (United States)

    Wollmann, Sabine; Walk, Nathan; Bennet, Adam J.; Wiseman, Howard M.; Pryde, Geoff J.

    2016-04-01

    Within the hierarchy of inseparable quantum correlations, Einstein-Podolsky-Rosen steering is distinguished from both entanglement and Bell nonlocality by its asymmetry—there exist conditions where the steering phenomenon changes from being observable to not observable, simply by exchanging the role of the two measuring parties. While this one-way steering feature has been previously demonstrated for the restricted class of Gaussian measurements, for the general case of positive-operator-valued measures even its theoretical existence has only recently been settled. Here, we prove, and then experimentally observe, the one-way steerability of an experimentally practical class of entangled states in this general setting. As well as its foundational significance, the demonstration of fundamentally asymmetric nonlocality also has practical implications for the distribution of the trust in quantum communication networks.

  10. A wind-powered one-way bistable medium with parity effects

    Science.gov (United States)

    Rosenberger, Tessa; Schattgen, Graham; King-Smith, Matthew; Shrestha, Prakrit; Maxted, Katsuo J.; Lindner, John F.

    2017-02-01

    We describe the design, construction, and dynamics of low-cost mechanical arrays of 3D-printed bistable elements whose shapes interact with wind to couple them one-way. Unlike earlier hydromechanical unidirectional arrays, our aeromechanical one-way arrays are simpler, easier to study, and exhibit a broader range of phenomena. Solitary waves or solitons propagate in one direction at speeds proportional to wind speeds. Periodic boundaries enable solitons to annihilate in pairs in arrays with an even number of elements. Solitons propagate indefinitely in odd arrays that frustrate pairing. Large noise spontaneously creates soliton-antisoliton pairs. Soliton annihilation times increase quadratically with initial separations, as expected for random-walk models of soliton collisions.

  11. One-Way Diffusion of Ionic Liquids in a Mixing Process with Water

    Science.gov (United States)

    Oikawa, Noriko; Tahara, Daiki; Kurita, Rei

    2016-09-01

    In contrast to the usual diffusive mixing process between two miscible liquids, the ionic liquid [Cnmim][PF6] forms a droplet in water while mixing. The droplet retains a sharp interface with surface tension, gradually decreasing in size until completely mixed with water. This peculiar behavior in the mixing process accompanies one-way diffusion, in which ions diffuse in one direction only from the bulk IL droplet into the bulk continuum of water. The activation energy of the one-way diffusion at the [Cnmim][PF6]/water interface increases with increasing length of the hydrophobic alkyl chains attached to the cation molecules of [Cnmim][PF6]. It is considered that the hydrophobic nanoscale structure observed in [C4mim][PF6] plays an important role in the generation of the droplet and the mixing dynamics.

  12. Experimental realization of Deutsch's algorithm in a one-way quantum computer.

    Science.gov (United States)

    Tame, M S; Prevedel, R; Paternostro, M; Böhi, P; Kim, M S; Zeilinger, A

    2007-04-06

    We report the first experimental demonstration of an all-optical one-way implementation of Deutsch's quantum algorithm on a four-qubit cluster state. All the possible configurations of a balanced or constant function acting on a two-qubit register are realized within the measurement-based model for quantum computation. The experimental results are in excellent agreement with the theoretical model, therefore demonstrating the successful performance of the algorithm.

  13. Aperiodicity in one-way Markov cycles and repeat times of large earthquakes in faults

    CERN Document Server

    Tejedor, Alejandro; Pacheco, Amalio F

    2011-01-01

    A common use of Markov Chains is the simulation of the seismic cycle in a fault, i.e. as a renewal model for the repetition of its characteristic earthquakes. This representation is consistent with Reid's elastic rebound theory. Here it is proved that in {\\it any} one-way Markov cycle, the aperiodicity of the corresponding distribution of cycle lengths is always lower than one. This fact concurs with observations of large earthquakes in faults all over the world.

  14. A comparison of one-way video and two-way video educational videoteleconferencing

    Science.gov (United States)

    Hendrix, Craig L.

    1995-05-01

    The literature reviewed in this study supported the effectiveness of educational videoteleconferencing; however, relatively little research was found comparing the two most interactive types of educational videoteleconferencing systems. An experimental research project was conducted, attempting to determine which educational videoteleconferencing system is more effective. Specifically, this project was designed to answer the following question: Is live two-way video with two-way audio more effective than live one-way video with two-way audio educational videoteleconferencing (EVC)?

  15. On one-way Doppler measurements of space craft and celestial objects

    Science.gov (United States)

    Jochim, E. F. M.

    2010-01-01

    The orbital velocity of a spacecraft and other celestial objects is monitored by observing the Doppler frequency shift of the signals received at the ground station. This is possible one-way in case the transmitted frequency is stable enough. In most spacecraft a calibrated transponder allows two-way Doppler frequency registrations. In general, the factor 2 is expected as the quotient between two- and one-way frequencies. However, this is no longer the case when the motion of the observed object deviates from the orbit as predicted. Frequency differences appear. Porsche (1999) has published a formula to describe these differences based on the assumption of a double projection of the true velocity vector. In the present paper a more sophisticated analysis of the influence of state errors on the track-ing results is deduced. This theory has been tested by the Doppler measurements during flybys of the comet space probe GIOTTO penetrating through the comae of the comets P/Halley and P/Grigg-Skjellerup. One-way Doppler measurements of the low Earth satellites CHAMP and TERRASAR-X show a tendency for the applicability of this approach. Finally, some conse-quences for the observation of other celestial objects are discussed.

  16. High speed and adaptable error correction for megabit/s rate quantum key distribution.

    Science.gov (United States)

    Dixon, A R; Sato, H

    2014-12-02

    Quantum Key Distribution is moving from its theoretical foundation of unconditional security to rapidly approaching real world installations. A significant part of this move is the orders of magnitude increases in the rate at which secure key bits are distributed. However, these advances have mostly been confined to the physical hardware stage of QKD, with software post-processing often being unable to support the high raw bit rates. In a complete implementation this leads to a bottleneck limiting the final secure key rate of the system unnecessarily. Here we report details of equally high rate error correction which is further adaptable to maximise the secure key rate under a range of different operating conditions. The error correction is implemented both in CPU and GPU using a bi-directional LDPC approach and can provide 90-94% of the ideal secure key rate over all fibre distances from 0-80 km.

  17. Measurement of one-way velocity of light and light-year

    Science.gov (United States)

    Chen, Shao-Guang

    For space science and astronomy the fundamentality of one-way velocity of light (OWVL) is selfevident. The measurement of OWVL (distance / interval) and the clock synchronization with light-signal transfer make a logical circulation. This means that OWVL could not be directly measured but only come indirectly from astronomical method (Romer's Io eclipse and Bradley's sidereal aberration). Furthermore, the light-year by definitional OWVL and the trigonometry distance with AU are also un-measurable. In this report two methods of clock synchronization to solve this problem were proposed: The arriving-time difference of longitudinal-transverse wave (Ts - Tp) or ordinary-extraordinary light (Te - To) is measured by single clock at one end of a dual-speed transmission-line, the signal transmission-delay (from sending-end time Tx to receiving-end time Tp or To) calculated with wave-speed ratio is: (Tp -Tx) = (Ts -Tp) / ((Vp / Vs) - 1) or: (To -Tx) = (Te - To) / ((Vo / Ve ) - 1), where (Vp / Vs) = (E / k) 1/2 is Yang's / shear elastic-modulus ratio obtained by comparing two strains at same stress, (Vo / Ve) = (ne / no) is extraordinary/ordinary light refractive-index ratio obtained by comparing two deflection-angles. Then, two clocks at transmission-line two ends can be synchronized directly to measure the one-way velocity of light and light-year, which work as one earthquakestation with single clock measures first-shake-time and the distance to epicenter. The readings Na and Nb of two counters Ca and Cb with distance L are transferred into a computer C by two leads with transmission-delay Tac and Tbc respectively. The computer progressing subtraction operation exports steady value: (Nb - Na) = f (Ta - Tb ) + f (Tac - Tbc ), where f is the frequency of light-wave always passing Ca and Cb, Ta and Tb are the count-start time of Ca and Cb respectively. From the transmission-delay possess the spatial translational and rotational invariability, the computer exports steady value

  18. One-way acoustic mirror based on anisotropic zero-index media

    Energy Technology Data Exchange (ETDEWEB)

    Gu, Zhong-ming; Liang, Bin, E-mail: liangbin@nju.edu.cn, E-mail: jccheng@nju.edu.cn; Yang, Jing; Cheng, Jian-chun, E-mail: liangbin@nju.edu.cn, E-mail: jccheng@nju.edu.cn [Key Laboratory of Modern Acoustics, MOE, Institute of Acoustics, Department of Physics, Nanjing University, Nanjing 210093 (China); Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093 (China); Zou, Xin-ye [Key Laboratory of Modern Acoustics, MOE, Institute of Acoustics, Department of Physics, Nanjing University, Nanjing 210093 (China); Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093 (China); State Key Laboratory of Acoustics, Chinese Academy of Sciences, Beijing 100190 (China); Li, Yong [CNRS, Institut Jean Lamour, Vandoeuvre-lès-Nancy F-54506, France and Institut Jean Lamour, Université de Lorraine, Boulevard des Aiguillettes, BP: 70239, 54506 Vandoeuvre-lès-Nancy (France); Yang, Jun [Key Laboratory of Noise and Vibration Research, Institute of Acoustics, Chinese Academy of Sciences, Beijing 100190 (China)

    2015-11-23

    We have designed a one-way acoustic mirror comprising anisotropic zero-index media. For acoustic beam incident at a particular angle, the designed structure behaves like a high-efficient mirror that redirects almost all the incident energy into another direction predicted by the Snell's law, while becoming virtually transparent to beams propagating reversely along this output path. Furthermore, the mirror can be tailored to work at arbitrary incident angle by simply adjusting its geometry. Our design, with undirectional reflection functionality and flexible working angle, may offer possibilities in space isolations and have deep implication in various scenarios like ultrasound imaging or noise control.

  19. One-Way Information Deficit and Geometry for a Class of Two-Qubit States

    Institute of Scientific and Technical Information of China (English)

    WANG Yao-Kun; MA Teng; LI Bo; WANG Zhi-Xi

    2013-01-01

    The work deficit,as introduced by Jonathan Oppenheim et al.[Phys.Rev.Lett.89 (2002) 180402]is a good measure of the quantum correlations in a state and provides a new standpoint for understanding quantum non-locality.In this paper,we analytically evaluate the one-way information deficit (OWID) for the Bell-diagonal states and a class of two-qubit states and further give the geometry picture for OWID.The dynamic behavior of the OWID under decoherence channel is investigated and it is shown that the OWID of some classes of X states is more robust against the decoherence than the entanglement.

  20. One-way hash function based on hyper-chaotic cellular neural network

    Institute of Scientific and Technical Information of China (English)

    Yang Qun-Ting; Gao Tie-Gang

    2008-01-01

    The design of an efficient one-way hash function with good performance is a hot spot in modern cryptography researches. In this paper, a hash function construction method based on cell neural network with hyper-chaos characteristics is proposed. First, the chaos sequence is gotten by iterating cellular neural network with Runge-Kutta algorithm, and then the chaos sequence is iterated with the message. The hash code is obtained through the corresponding transform of the latter chaos sequence. Simulation and analysis demonstrate that the new method has the merit of convenience, high sensitivity to initial values, good hash performance, especially the strong stability.

  1. Complete synchronization and generalized synchronization of one-way coupled time-delay systems.

    Science.gov (United States)

    Zhan, Meng; Wang, Xingang; Gong, Xiaofeng; Wei, G W; Lai, C-H

    2003-09-01

    The complete synchronization and generalized synchronization (GS) of one-way coupled time-delay systems are studied. We find that GS can be achieved by a single scalar signal, and its synchronization threshold for different delay times shows the parameter resonance effect, i.e., we can obtain stable synchronization at a smaller coupling if the delay time of the driven system is chosen such that it is in resonance with the driving system. Near chaos synchronization, the desynchronization dynamics displays periodic bursts with the period equal to the delay time of the driven system. These features can be easily applied to the recovery of time-delay systems.

  2. Seismic Imaging, One-Way Wave Equations, Pseudodifferential Operators, Path Integrals, and all that Jazz

    Science.gov (United States)

    Artoun, Ojenie; David-Rus, Diana; Emmett, Matthew; Fishman, Lou; Fital, Sandra; Hogan, Chad; Lim, Jisun; Lushi, Enkeleida; Marinov, Vesselin

    2006-05-01

    In this report we summarize an extension of Fourier analysis for the solution of the wave equation with a non-constant coefficient corresponding to an inhomogeneous medium. The underlying physics of the problem is exploited to link pseudodifferential operators and phase space path integrals to obtain a marching algorithm that incorporates the backward scattering into the evolution of the wave. This allows us to successfully apply single-sweep, one-way marching methods in inherently two-way environments, which was not achieved before through other methods for this problem.

  3. One-Way Ranging Method Using Reference-Based Broadcasting Messages for Wireless Sensor Networks

    Science.gov (United States)

    Lee, Cheolhyo; Nam, Yoon-Seok; Kim, Jae-Young; Cho, You-Ze

    This paper proposes a one-way ranging method using reference-based broadcasting messages. The method is based on impulse radio UWB (Ultra-wideband) for wireless sensor networks. The proposed method reduces traffic overheads and increases the ranging accuracy using frequency offsets and counter information based on virtually synchronized counters between RNs (Reference Nodes) and MNs (Mobile Nodes). Simulation results show that the proposed method can alleviate the ranging errors comparing to SDS-TWR (Symmetric Double-Sided Two-Way Ranging) method in terms of the frequency offset.

  4. A Note on the Existence of the Posteriors for One-way Random Effect Probit Models.

    Science.gov (United States)

    Lin, Xiaoyan; Sun, Dongchu

    2010-01-01

    The existence of the posterior distribution for one-way random effect probit models has been investigated when the uniform prior is applied to the overall mean and a class of noninformative priors are applied to the variance parameter. The sufficient conditions to ensure the propriety of the posterior are given for the cases with replicates at some factor levels. It is shown that the posterior distribution is never proper if there is only one observation at each factor level. For this case, however, a class of proper priors for the variance parameter can provide the necessary and sufficient conditions for the propriety of the posterior.

  5. Generating equally weighted test particles from the one-way flux of a drifting Maxwellian

    Science.gov (United States)

    Makkonen, T.; Airila, M. I.; Kurki-Suonio, T.

    2015-01-01

    The problem of generating equally weighted test particles from the one way flux of drifting Maxwellian is tackled. This paper extends previous work on the subject by presenting a simple and efficient rejection sampling algorithm together with C++ source files. The properties of the underlying probability distribution function, having the form of a normal distribution times x with positive support, are also disseminated. The method presented in this paper has been successfully used to combine fluid and kinetic models for trace impurity problems in plasma physics.

  6. One-way spatial integration of Navier-Stokes equations: stability of wall-bounded flows

    Science.gov (United States)

    Rigas, Georgios; Colonius, Tim; Towne, Aaron; Beyar, Michael

    2016-11-01

    For three-dimensional flows, questions of stability, receptivity, secondary flows, and coherent structures require the solution of large partial-derivative eigenvalue problems. Reduced-order approximations are thus required for engineering prediction since these problems are often computationally intractable or prohibitively expensive. For spatially slowly evolving flows, such as jets and boundary layers, a regularization of the equations of motion sometimes permits a fast spatial marching procedure that results in a huge reduction in computational cost. Recently, a novel one-way spatial marching algorithm has been developed by Towne & Colonius. The new method overcomes the principle flaw observed in Parabolized Stability Equations (PSE), namely the ad hoc regularization that removes upstream propagating modes. The one-way method correctly parabolizes the flow equations based on estimating, in a computationally efficient way, the local spectrum in each cross-stream plane and an efficient spectral filter eliminates modes with upstream group velocity. Results from the application of the method to wall-bounded flows will be presented and compared with predictions from the full linearized compressible Navier-Stokes equations and PSE.

  7. Quantification of Information in a One-Way Plant-to-Animal Communication System

    Directory of Open Access Journals (Sweden)

    Laurance R. Doyle

    2009-08-01

    Full Text Available In order to demonstrate possible broader applications of information theory to the quantification of non-human communication systems, we apply calculations of information entropy to a simple chemical communication from the cotton plant (Gossypium hirsutum to the wasp (Cardiochiles nigriceps studied by DeMoraes et al. The purpose of this chemical communication from cotton plants to wasps is presumed to be to allow the predatory wasp to more easily obtain the location of its preferred prey—one of two types of parasitic herbivores feeding on the cotton plants. Specification of the plant-eating herbivore feeding on it by the cotton plants allows preferential attraction of the wasps to those individual plants. We interpret the emission of nine chemicals by the plants as individual signal differences, (depending on the herbivore type, to be detected by the wasps as constituting a nine-signal one-way communication system across kingdoms (from the kingdom Plantae to the kingdom Animalia. We use fractional differences in the chemical abundances, (emitted as a result of the two herbivore types, to calculate the Shannon information entropic measures (marginal, joint, and mutual entropies, as well as the ambiguity, etc. of the transmitted message. We then compare these results with the subsequent behavior of the wasps, (calculating the equivocation in the message reception, for possible insights into the history and actual working of this one-way communication system.

  8. One-way absorber for linearly polarized electromagnetic wave utilizing composite metamaterial.

    Science.gov (United States)

    Zhao, Junming; Sun, Liang; Zhu, Bo; Feng, Yijun

    2015-02-23

    This paper presents the proposal and practical design of a one-way absorber for selective linearly polarized electromagnetic (EM) wave. The EM wave polarization rotation property has been combined with polarization selective absorption utilizing a composite metamaterial slab. The energy of certain linearly polarized EM wave can be absorbed along one particular incident direction, but will be fully transmitted through the opposite direction. For the cross polarized wave, the direction dependent propagation properties are totally reversed. A prototype designed with a total slab thickness of only one-sixth of the operating wavelength is verified through both full-wave simulation and experimental measurement in the microwave regime. It achieves absorption efficiency over 83% along one direction, while transmission efficiency over 83% along the opposite direction for one particular linearly polarized wave. The proposed one-way absorber can be applied in EM devices achieving asymmetric transmission for linearly polarized wave or polarization control. The composite metamaterial that combines different functionalities into one design may provide more potential in metamaterial designs for various applications.

  9. Behavior of one-way reinforced concrete slabs subjected to fire

    Directory of Open Access Journals (Sweden)

    Said M. Allam

    2013-12-01

    Full Text Available A finite difference analysis was performed to investigate the behavior of one-way reinforced concrete slabs exposed to fire. The objective of the study was to investigate the fire resistance and the fire risk after extinguishing the fire. Firstly, the fire resistance was obtained using the ISO834 standard fire without cooling phase. Secondly, the ISO834 parametric fire with cooling phase was applied to study the effect of cooling time. Accordingly, the critical time for cooling was identified and the corresponding failure time was calculated. Moreover, the maximum risk time which is the time between the fire extinguishing and the collapse of slab was obtained. Sixteen one-way reinforced concrete slabs were considered to study the effect of important parameters namely: the concrete cover thickness; the plaster; and the live load ratio. Equations for heat transfer through the slab thickness were used in the fire resistance calculations. Studying the cooling time revealed that the slabs are still prone to collapse although they were cooled before their fire resistance. Moreover, increasing the concrete cover thickness and the presence of plaster led to an increase in the maximum risk time. However, the variation in the live load ratio has almost no effect on such time.

  10. One-way ticket” Romanian Migration at the beginning of the 20th century

    Directory of Open Access Journals (Sweden)

    Silvia Bocancea

    2011-12-01

    Full Text Available Unlike the new age of migration that we are experiencing now, the social mobility specific to the end of the 19th century and the beginning of the 20th century may be defined by the expression “one way ticket”; the immigrant, usually a man, used to leave his country of origin and settle for good in his host-country (he did not look for his happiness from state to state, as it happens now. The Romanian migration of that time was directed mainly towards the New World (particularly to the USA, and less to Canada. This paper is an attempt to sketch the image of Romanian emigration by taking into account the peculiarities determined by: emigration causes, geographical predominance, social composition, occupational options in the host-country, and the structure of Romanian immigrant communities.

  11. Scalable one-way quantum computer using on-chip resonator qubits

    CERN Document Server

    Wu, Chun-Wang; Li, Hong-Yi; Deng, Zhi-Jiao; Dai, Hong-Yi; Chen, Ping-Xing; Li, Cheng-Zu

    2011-01-01

    We propose a scalable and robust architecture for one-way quantum computation using coupled networks of superconducting transmission line resonators. In our protocol, quantum information is encoded into the long-lived photon states of the resonators, which have a much longer coherence time than the usual superconducting qubits. Each resonator contains a charge qubit used for the state initialization and local projective measurement of the photonic qubit. Any pair of neighboring photonic qubits are coupled via a mediator charge qubit, and large photonic cluster states can be created by applying Stark-shifted Rabi pulses to these mediator qubits. The distinct advantage of our architecture is that it combines both the excellent scalability of the solid-state systems and the long coherence time of the photonic qubits. Furthermore, this architecture is very robust against the parameter variations.

  12. One-way sequencing of multiple amplicons from tandem repetitive mitochondrial DNA control region.

    Science.gov (United States)

    Xu, Jiawu; Fonseca, Dina M

    2011-10-01

    Repetitive DNA sequences not only exist abundantly in eukaryotic nuclear genomes, but also occur as tandem repeats in many animal mitochondrial DNA (mtDNA) control regions. Due to concerted evolution, these repetitive sequences are highly similar or even identical within a genome. When long repetitive regions are the targets of amplification for the purpose of sequencing, multiple amplicons may result if one primer has to be located inside the repeats. Here, we show that, without separating these amplicons by gel purification or cloning, directly sequencing the mitochondrial repeats with the primer outside repetitive region is feasible and efficient. We exemplify it by sequencing the mtDNA control region of the mosquito Aedes albopictus, which harbors typical large tandem DNA repeats. This one-way sequencing strategy is optimal for population surveys.

  13. The exact distribution of Cochran's heterogeneity statistic in one-way random effects meta-analysis.

    Science.gov (United States)

    Biggerstaff, Brad J; Jackson, Dan

    2008-12-20

    The presence and impact of heterogeneity in the standard one-way random effects model in meta-analysis are often assessed using the Q statistic due to Cochran. We derive the exact distribution of this statistic under the assumptions of the random effects model, and also suggest two moment-based approximations and a saddlepoint approximation for Q. The exact and approximate distributions are then applied to obtain the corresponding distributions of the recently proposed heterogeneity measures I(2) and H(M)(2), the power of the standard test for the presence of heterogeneity and confidence intervals for the between-study variance parameter when the DerSimonian-Laird or the Hartung-Makambi estimator is used. The methodology is illustrated by revisiting a recent simulation study concerning the heterogeneity measures and applying all the proposed methods to four published meta-analyses.

  14. Acoustic one-way metasurfaces: Asymmetric Phase Modulation of Sound by Subwavelength Layer

    Science.gov (United States)

    Jiang, Xue; Liang, Bin; Zou, Xin-Ye; Yang, Jing; Yin, Lei-Lei; Yang, Jun; Cheng, Jian-Chun

    2016-06-01

    We theoretically design and numerically demonstrate an acoustic one-way metasurface, which is a planar and acoustically subwavelength layer behaving like a nearly-reflectionless surface with arbitrary wave-steering capability for incident wave impinging on one side, while virtually blocking the reversed wave. The underlying mechanism is based on an asymmetric phase modulation by coupling a phase array and a near-zero-index medium. We exemplify a metastructure-based implementation by combining the hybrid metastuctures and labyrinthine structures. Moreover, the performance of the proposed implementation is demonstrated via three distinct phenomena of anomalous refraction, wave splitting and conversion of propagation wave to surface wave. Our findings may offer more possibilities for sound manipulation and improve the application potential of acoustic artificial devices in situations such as ultrasonic imaging and therapy.

  15. One-way rotation of a molecule-rotor driven by a shot noise.

    Science.gov (United States)

    Echeverria, Jorge; Monturet, Serge; Joachim, Christian

    2014-03-07

    The shot noise of a tunneling current passing through a molecule-motor can sustain a one-way rotation when populating the molecular excited states by tunneling inelastic excitations. We demonstrate that a ratchet-like ground state rotation potential energy curve is not necessary for the rotation to occur. A relative shift in energy difference between the maxima of this ground state and the minima of the excited states is the necessary condition to get to a unidirectional rotation. The rotor speed of rotation and its rotation direction are both controlled by this shift, indicating the necessity of a careful design of both the ground and excited states of the next generation of molecule-motors to be able to generate a motive power at the nanoscale.

  16. A Novel Approach for Verifiable Secret Sharing by using a One Way Hash Function

    CERN Document Server

    Parmar, Keyur

    2012-01-01

    Threshold secret sharing schemes do not prevent any malicious behavior of the dealer or shareholders and so we need verifiable secret sharing, to detect and identify the cheaters, to achieve fair reconstruction of a secret. The problem of verifiable secret sharing is to verify the shares distributed by the dealer. A novel approach for verifiable secret sharing is presented in this paper where both the dealer and shareholders are not assumed to be honest. In this paper, we extend the term verifiable secret sharing to verify the shares, distributed by a dealer as well as shares submitted by shareholders for secret reconstruction, and to verify the reconstructed secret. Our proposed scheme uses a one way hash function and probabilistic homomorphic encryption function to provide verifiability and fair reconstruction of a secret.

  17. Demonstration of a Controlled-Phase Gate for Continuous-Variable One-Way Quantum Computation

    CERN Document Server

    Ukai, Ryuji; Yoshikawa, Jun-ichi; van Loock, Peter; Furusawa, Akira

    2011-01-01

    We experimentally demonstrate a controlled-phase gate for continuous variables in a fully measurement-based fashion. In our scheme, the two independent input states of the gate, encoded in two optical modes, are teleported into a four-mode Gaussian cluster state. As a result, one of the entanglement links present in the initial cluster state appears in the two unmeasured output modes as the corresponding entangling gate acting on the input states. The genuine quantum character of this gate becomes manifest and is verified through the presence of entanglement at the output for a product two-mode coherent input state. By combining our controlled-phase gate with the recently reported module for universal single-mode Gaussian operations [R. Ukai et al., Phys. Rev. Lett. 106, 240504 (2011)], it is possible to implement universal Gaussian operations on arbitrary multi-mode quantum optical states in form of a fully measurement-based one-way quantum computation.

  18. An experiment to measure the one-way velocity of propagation of electromagnetic radiation

    Science.gov (United States)

    Kolen, P.; Torr, D. G.

    1982-01-01

    An experiment involving commercially available instrumentation to measure the velocity of the earth with respect to absolute space is described. The experiment involves the measurement of the one-way propagation velocity of electromagnetic radiation down a high-quality coaxial cable. It is demonstrated that the experiment is both physically meaningful and exceedingly simple in concept and in implementation. It is shown that with currently available commercial equipment one might expect to detect a threshold value for the component of velocity of the earth's motion with respect to absolute space in the equatorial plane of approximately 10 km/s, which greatly exceeds the velocity resolution required to detect the motion of the solar system with respect to the center of the galaxy.

  19. A Hybrid One-Way ANOVA Approach for the Robust and Efficient Estimation of Differential Gene Expression with Multiple Patterns.

    Directory of Open Access Journals (Sweden)

    Mohammad Manir Hossain Mollah

    Full Text Available Identifying genes that are differentially expressed (DE between two or more conditions with multiple patterns of expression is one of the primary objectives of gene expression data analysis. Several statistical approaches, including one-way analysis of variance (ANOVA, are used to identify DE genes. However, most of these methods provide misleading results for two or more conditions with multiple patterns of expression in the presence of outlying genes. In this paper, an attempt is made to develop a hybrid one-way ANOVA approach that unifies the robustness and efficiency of estimation using the minimum β-divergence method to overcome some problems that arise in the existing robust methods for both small- and large-sample cases with multiple patterns of expression.The proposed method relies on a β-weight function, which produces values between 0 and 1. The β-weight function with β = 0.2 is used as a measure of outlier detection. It assigns smaller weights (≥ 0 to outlying expressions and larger weights (≤ 1 to typical expressions. The distribution of the β-weights is used to calculate the cut-off point, which is compared to the observed β-weight of an expression to determine whether that gene expression is an outlier. This weight function plays a key role in unifying the robustness and efficiency of estimation in one-way ANOVA.Analyses of simulated gene expression profiles revealed that all eight methods (ANOVA, SAM, LIMMA, EBarrays, eLNN, KW, robust BetaEB and proposed perform almost identically for m = 2 conditions in the absence of outliers. However, the robust BetaEB method and the proposed method exhibited considerably better performance than the other six methods in the presence of outliers. In this case, the BetaEB method exhibited slightly better performance than the proposed method for the small-sample cases, but the the proposed method exhibited much better performance than the BetaEB method for both the small- and large

  20. Checking Questionable Entry of Personally Identifiable Information Encrypted by One-Way Hash Transformation

    Science.gov (United States)

    Chen, Xianlai; Fann, Yang C; McAuliffe, Matthew; Vismer, David

    2017-01-01

    Background As one of the several effective solutions for personal privacy protection, a global unique identifier (GUID) is linked with hash codes that are generated from combinations of personally identifiable information (PII) by a one-way hash algorithm. On the GUID server, no PII is permitted to be stored, and only GUID and hash codes are allowed. The quality of PII entry is critical to the GUID system. Objective The goal of our study was to explore a method of checking questionable entry of PII in this context without using or sending any portion of PII while registering a subject. Methods According to the principle of GUID system, all possible combination patterns of PII fields were analyzed and used to generate hash codes, which were stored on the GUID server. Based on the matching rules of the GUID system, an error-checking algorithm was developed using set theory to check PII entry errors. We selected 200,000 simulated individuals with randomly-planted errors to evaluate the proposed algorithm. These errors were placed in the required PII fields or optional PII fields. The performance of the proposed algorithm was also tested in the registering system of study subjects. Results There are 127,700 error-planted subjects, of which 114,464 (89.64%) can still be identified as the previous one and remaining 13,236 (10.36%, 13,236/127,700) are discriminated as new subjects. As expected, 100% of nonidentified subjects had errors within the required PII fields. The possibility that a subject is identified is related to the count and the type of incorrect PII field. For all identified subjects, their errors can be found by the proposed algorithm. The scope of questionable PII fields is also associated with the count and the type of the incorrect PII field. The best situation is to precisely find the exact incorrect PII fields, and the worst situation is to shrink the questionable scope only to a set of 13 PII fields. In the application, the proposed algorithm can

  1. Design and analysis of logarithmic spiral type sprag one-way clutch

    Institute of Scientific and Technical Information of China (English)

    刘志辉; 严宏志; 曹煜明

    2015-01-01

    A complete mathematical model for logarithmic spiral type sprag one-way clutch design and analysis is given. It assumes that the motion of all clutch components can be expressed by a model of epicyclic gearing. It takes advantage of Hunt-Crossley contact impact theory to calculate the contact forces between sprags and races, and it can be used for optimization of design and comparison with other types of sprag clutches. A good deal of analysis shows that the parameters of the steady windup angle, the steady contact force, the natural frequency and natural cycle of clutch have nothing to do with the initial velocity of outer race, while the parameters of the maximum transient windup angle, the maximum transient impact force and the steady engagement time increase linearly in the mode of engaging operation of clutch. It is also shown that the strut angle has great influence on the dynamic engagement performance of clutch. The parameters of the steady windup angle, the maximum transient windup angle, the steady engaging time, the steady contact force, the maximum transient impact force and the natural cycle of clutch decrease linearly nearly with the inner strut angle, while the natural frequency of the system increases linearly with the inner strut angle.

  2. File-Based One-Way BISON Coupling Through VERA: User's Manual

    Energy Technology Data Exchange (ETDEWEB)

    Stimpson, Shane G. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-02-28

    Activities to incorporate fuel performance capabilities into the Virtual Environment for Reactor Applications (VERA) are receiving increasing attention [1–6]. The multiphysics emphasis is expanding as the neutronics (MPACT) and thermal-hydraulics (CTF) packages are becoming more mature. Capturing the finer details of fuel phenomena (swelling, densification, relocation, gap closure, etc.) is the natural next step in the VERA development process since these phenomena are currently not directly taken into account. While several codes could be used to accomplish this, the BISON fuel performance code [8,9] being developed by the Idaho National Laboratory (INL) is the focus of ongoing work in the Consortium for Advanced Simulation of Light Water Reactors (CASL). Built on INL’s MOOSE framework [10], BISON uses the finite element method for geometric representation and a Jacobian-free Newton-Krylov (JFNK) scheme to solve systems of partial differential equations for various fuel characteristic relationships. There are several modes of operation in BISON, but, this work uses a 2D azimuthally symmetric (R-Z) smeared-pellet model. This manual is intended to cover (1) the procedure pertaining to the standalone BISON one-way coupling from VERA and (2) the procedure to generate BISON fuel temperature tables that VERA can use.

  3. The Galactic One-Way Shapiro Delay to PSR B1937+21

    CERN Document Server

    Desai, S

    2015-01-01

    The time delay experienced by a light ray as it passes through a changing gravitational potential by a non-zero mass distribution along the line of sight is usually referred to as Shapiro delay. Shapiro delay has been extensively measured in the Solar system and in binary pulsars, enabling stringent tests of general relativity as well as measurement of neutron star masses . However, Shapiro delay is ubiquitous and experienced by all astrophysical messengers on their way from the source to the Earth. We calculate the "one-way" static Shapiro delay for the first discovered millisecond pulsar PSR~B1937+21, by including the contributions from both the dark matter and baryonic matter between this pulsar and the Earth. We find a value of approximately 5 days (of which 4.74 days is from the dark matter and 0.22 days from the baryonic matter). We also calculate the modulation of Shapiro delay from the motion of a single dark matter halo, and also evaluate the cumulative effects of the motion of matter distribution on...

  4. Building of one-way Hadamard gate for squeezed coherent states

    Science.gov (United States)

    Podoshvedov, Sergey A.

    2013-01-01

    We present an optical scheme to conditionally generate even or odd squeezed superpositions of coherent states (SSCSs). The optical setup consists of an unbalanced beam splitter whose transmittance tends to unity, and additional balanced beam splitters and photodetectors in auxiliary modes. Squeezed coherent states with different amplitudes are the input states in the optical scheme. The single-qubit operations are probabilistic and employ two- and three-photon subtractions from initial beams as the driving force. Generation of the even or odd SSCSs is observed in a wide diapason of values of used parameters. We consider a possibility to realize a one-way Hadamard gate for the squeezed coherent states when the base states are transformed into superposition states. States approximating the output states of a Hadamard gate with high fidelity can be realized by imposing restrictions on the values of used parameters. Higher-order subtractions from input beams are necessary to generate the SSCSs with larger amplitudes and higher fidelities. The problem is resolved in a Wigner representation to take into account imperfections of the optical devices.

  5. Evidence-based practice guidelines--one way to enhance clinical practice.

    Science.gov (United States)

    Bailes, Barbara K

    2002-06-01

    Abdominoplasty and liposuction guidelines are just two of the guidelines that can be accessed and used to enhance patient care. Guidelines also can be used to increase your knowledge about many other health care topics. The NGC has approved guidelines for managing chronic pain, as well as guidelines on chronic diseases (e.g., diabetes mellitus, hypertension, chronic obstructive pulmonary disease). Many patients have chronic diseases, and you or your family members also may be affected by chronic disorders. These guidelines provide you with a quick overview of evidence-based treatment protocols. These guidelines are not a panacea for evidence-based practice, but using them is one way that perioperative nurses can enhance their clinical skills. Though not everyone has personal Internet access, most health care facilities do or can make access a reality. Other options include medical or public libraries. Then one simply has to access the NGC web site and join other professionals in improving the quality and timeliness of patient care.

  6. Delay or anticipatory synchronization in one-way coupled systems using variable delay with reset

    Indian Academy of Sciences (India)

    G Ambika; R E Amritkar

    2011-11-01

    We present a mechanism for the synchronization of one-way coupled nonlinear systems in which the coupling uses a variable delay, that is reset at finite intervals. Here the delay varies in the same way as the system in time and so the coupling function remains constant for the reset interval at the end of which it is reset to the value at that time. This leads to a novel and discrete error dynamics and the resulting general stability analysis is applicable to chaotic or hyperchaotic systems. We apply this method to standard chaotic systems and hyperchaotic time delay systems. The results of the detailed numerical analysis agree with the results from stability analysis in both cases. This method has the advantage that it is cost-effective since information from the driving system is needed only at intervals of reset. Further, in the context of time delay systems, optimization among the different time-scales depending upon the application is possible due to the flexibility among the four different time-scales in our method, viz. delay in the driving system, anticipation in the response system, system delay time and reset time. We suggest a bi-channel scheme for implementing this method in communication field with enhanced security

  7. Asymptotic key generation rates with phase-randomized coherent light by decoy method

    CERN Document Server

    Hayashi, M

    2007-01-01

    The asymptotic key generation (AKG) rates of quantum key distribution (QKD) with the decoy method are discussed in both the forward error correction and the reverse error correction cases when the QKD system is equipped with phase-randomized coherent light with arbitrary number of intensities. For this purpose, we derive a useful convex expansion of the phase-randomized coherent state. We also derive upper bounds of AKG rates on a natural and concrete channel model. Using these upper bounds, we numerically check that the AKG rates are almost saturated when the number of intensities is three.

  8. Manipulating one-way space wave and its refraction by time-reversal and parity symmetry breaking.

    Science.gov (United States)

    Poo, Yin; He, Cheng; Xiao, Chao; Lu, Ming-Hui; Wu, Rui-Xin; Chen, Yan-Feng

    2016-07-08

    One-way transmission and negative refraction are the exotic wave properties founded in photonic crystals which attract a great attention due to their promising applications in photonic devices. How to integrate such two phenomena in one material or device is interesting and valuable. In this work, we theoretically and experimentally demonstrate that one-way electromagnetic space wave can be realized by means of two-dimensional magnetic photonic crystals. Simultaneously breaking the time-reversal and parity symmetries of the magnetic photonic crystals designed, we observe oblique incident space wave propagating one-way in the magnetic photonic crystals with positive or negative refraction occurring at interfaces, which can be manipulated upon the incident angle and operating frequency. Our work may offer a potential platform to realize some exotic photoelectronic and microwave devices such as one-way imaging and one-way cloaking.

  9. One-way-coupling simulation of cavitation accompanied by high-speed droplet impact

    Science.gov (United States)

    Kondo, Tomoki; Ando, Keita

    2016-03-01

    Erosion due to high-speed droplet impact is a crucial issue in industrial applications. The erosion is caused by the water-hammer loading on material surfaces and possibly by the reloading from collapsing cavitation bubbles that appear within the droplet. Here, we simulate the dynamics of cavitation bubbles accompanied by high-speed droplet impact against a deformable wall in order to see whether the bubble collapse is violent enough to give rise to cavitation erosion on the wall. The evolution of pressure waves in a single water (or gelatin) droplet to collide with a deformable wall at speed up to 110 m/s is inferred from simulations of multicomponent Euler flow where phase changes are not permitted. Then, we examine the dynamics of cavitation bubbles nucleated from micron/submicron-sized gas bubble nuclei that are supposed to exist inside the droplet. For simplicity, we perform Rayleigh-Plesset-type calculations in a one-way-coupling manner, namely, the bubble dynamics are determined according to the pressure variation obtained from the Euler flow simulation. In the simulation, the preexisting bubble nuclei whose size is either micron or submicron show large growth to submillimeters because tension inside the droplet is obtained through interaction of the pressure waves and the droplet interface; this supports the possibility of having cavitation due to the droplet impact. It is also found, in particular, for the case of cavitation arising from very small nuclei such as nanobubbles, that radiated pressure from the cavitation bubble collapse can overwhelm the water-hammer pressure directly created by the impact. Hence, cavitation may need to be accounted for when it comes to discussing erosion in the droplet impact problem.

  10. Analysis of detector performance in a gigahertz clock rate quantum key distribution system

    Energy Technology Data Exchange (ETDEWEB)

    Clarke, Patrick J; Collins, Robert J; Hiskett, Philip A; GarcIa-MartInez, MarIa-Jose; Krichel, Nils J; McCarthy, Aongus; Tanner, Michael G; O' Connor, John A; Natarajan, Chandra M; Hadfield, Robert H; Buller, Gerald S [Scottish Universities Physics Alliance and School of Engineering and Physical Sciences, Heriot-Watt University, Edinburgh EH14 4AS (United Kingdom); Miki, Shigehito; Sasaki, Masahide; Wang, Zhen; Fujiwara, Mikio [National Institute of Information and Communications Technology (NICT), 4-2-1 Nukui-kitamachi, Koganei, Tokyo 184-8795 (Japan); Rech, Ivan; Ghioni, Massimo; Gulinatti, Angelo [Politecnico di Milano, Piazza Leonardo da Vinci 32, 20133 Milano (Italy); Townsend, Paul D, E-mail: G.S.Buller@hw.ac.uk [Tyndall National Institute and Department of Physics, University College Cork, Cork (Ireland)

    2011-07-15

    We present a detailed analysis of a gigahertz clock rate environmentally robust phase-encoded quantum key distribution (QKD) system utilizing several different single-photon detectors, including the first implementation of an experimental resonant cavity thin-junction silicon single-photon avalanche diode. The system operates at a wavelength of 850 nm using standard telecommunications optical fibre. A general-purpose theoretical model for the performance of QKD systems is presented with reference to these experimental results before predictions are made about realistic detector developments in this system. We discuss, with reference to the theoretical model, how detector operating parameters can be further optimized to maximize key exchange rates.

  11. High-Rate Field Demonstration of Large-Alphabet Quantum Key Distribution

    Science.gov (United States)

    2016-12-13

    allowing secure communication in the presence of an eaves- dropper. It commonly relies on detecting single photons, but the secret-key generation rates...such large-alphabet schemes can encode more secure information per detected photon, boosting secure communication rates, and also provide increased...energy encoding is appeal- ing for its compatibility with existing telecommunications infrastructure — which lowers the barriers to widespread adoption

  12. Quantum Key Distribution in a Multi-User Network at Gigahertz Clock rates

    CERN Document Server

    Fernández, V; Collins, R J; Townsend, P D; Cova, S D; Rech, I; Buller, G S; Fernandez, Veronica; Gordon, Karen J.; Collins, Robert J.; Townsend, Paul D.; Cova, Sergio D.; Rech, Ivan; Buller, Gerald S.

    2005-01-01

    In recent years quantum information research has lead to the discovery of a number of remarkable new paradigms for information processing and communication. These developments include quantum cryptography schemes that offer unconditionally secure information transport guaranteed by quantum-mechanical laws. Such potentially disruptive security technologies could be of high strategic and economic value in the future. Two major issues confronting researchers in this field are the transmission range (typically <100km) and the key exchange rate, which can be as low as a few bits per second at long optical fiber distances. This paper describes further research of an approach to significantly enhance the key exchange rate in an optical fiber system at distances in the range of 1-20km. We will present results on a number of application scenarios, including point-to-point links and multi-user networks. Quantum key distribution systems have been developed, which use standard telecommunications optical fiber, and whi...

  13. Can the one-way speed of light be used for detection of violations of the relativity principle?

    Energy Technology Data Exchange (ETDEWEB)

    Spavieri, Gianfranco, E-mail: spavieri@ula.ve [Centro de Física Fundamental, Universidad de Los Andes, Mérida 5101 (Venezuela, Bolivarian Republic of); Quintero, Jesús [Postgrado en Física Matemática, Universidad Centroccidental “Lisandro Alvarado”, Barquisimeto 3001 (Venezuela, Bolivarian Republic of); Unnikrishnan, C.S. [Gravitation Group, Tata Institute of Fundamental Research, Mumbai 400005 (India); Gillies, George T. [Department of Physics, University of Virginia, Charlottesville, VA 22904-4714 (United States); Cavalleri, Giancarlo; Tonni, Ernesto [Dipartimento di Matematica e Fisica, Università Cattolica del Sacro Cuore, 25121 Brescia (Italy); Bosi, Leonardo [Politecnico di Milano, CNR/INFM and Dipartimento di Fisica, 20133 Milano (Italy)

    2012-01-30

    Experimental attempts at measurement of the one-way speed of light are considered within the framework of relativistic theories. We show that if the effect of clock transport is taken into account, the observations from this class of experiment do not actually lead to either measurement of the one-way speed of light or determination of the absolute velocity of the preferred frame (even if, for non-entrained ether theories, such a frame were to exist). -- Highlights: ► We consider preferred frame theories that agree with experiments that support SR. ► Measurements of the one-way speed of light is discussed. ► The effect of clock transport is taken into account. ► These experiments do not lead to measurement of the one-way speed of light. ► The absolute velocity of the preferred frame cannot be detected.

  14. Manipulating one-way space wave and its refraction by time-reversal and parity symmetry breaking

    OpenAIRE

    Yin Poo; Cheng He; Chao Xiao; Ming-Hui Lu; Rui-Xin Wu; Yan-Feng Chen

    2016-01-01

    One-way transmission and negative refraction are the exotic wave properties founded in photonic crystals which attract a great attention due to their promising applications in photonic devices. How to integrate such two phenomena in one material or device is interesting and valuable. In this work, we theoretically and experimentally demonstrate that one-way electromagnetic space wave can be realized by means of two-dimensional magnetic photonic crystals. Simultaneously breaking the time-rever...

  15. Alternatives to F-Test in One Way ANOVA in case of heterogeneity of variances (a simulation study

    Directory of Open Access Journals (Sweden)

    Karl Moder

    2010-12-01

    Full Text Available Several articles deal with the effects of inhomogeneous variances in one way analysis of variance (ANOVA. A very early investigation of this topic was done by Box (1954. He supposed, that in balanced designs with moderate heterogeneity of variances deviations of the empirical type I error rate (on experiments based realized α to the nominal one (predefined α for H0 are small. Similar conclusions are drawn by Wellek (2003. For not so moderate heterogeneity (e.g. σ1:σ2:...=3:1:... Moder (2007 showed, that empirical type I error rate is far beyond the nominal one, even with balanced designs. In unbalanced designs the difficulties get bigger. Several attempts were made to get over this problem. One proposal is to use a more stringent α level (e.g. 2.5% instead of 5% (Keppel & Wickens, 2004. Another recommended remedy is to transform the original scores by square root, log, and other variance reducing functions (Keppel & Wickens, 2004, Heiberger & Holland, 2004. Some authors suggest the use of rank based alternatives to F-test in analysis of variance (Vargha & Delaney, 1998. Only a few articles deal with two or multifactorial designs. There is some evidence, that in a two or multi-factorial design type I error rate is approximately met if the number of factor levels tends to infinity for a certain factor while the number of levels is fixed for the other factors (Akritas & S., 2000, Bathke, 2004.The goal of this article is to find an appropriate location test in an oneway analysis of variance situation with inhomogeneous variances for balanced and unbalanced designs based on a simulation study.

  16. Room temperature single-photon detectors for high bit rate quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Comandar, L. C.; Patel, K. A. [Toshiba Research Europe Ltd., 208 Cambridge Science Park, Milton Road, Cambridge CB4 0GZ (United Kingdom); Engineering Department, Cambridge University, 9 J J Thomson Ave., Cambridge CB3 0FA (United Kingdom); Fröhlich, B., E-mail: bernd.frohlich@crl.toshiba.co.uk; Lucamarini, M.; Sharpe, A. W.; Dynes, J. F.; Yuan, Z. L.; Shields, A. J. [Toshiba Research Europe Ltd., 208 Cambridge Science Park, Milton Road, Cambridge CB4 0GZ (United Kingdom); Penty, R. V. [Engineering Department, Cambridge University, 9 J J Thomson Ave., Cambridge CB3 0FA (United Kingdom)

    2014-01-13

    We report room temperature operation of telecom wavelength single-photon detectors for high bit rate quantum key distribution (QKD). Room temperature operation is achieved using InGaAs avalanche photodiodes integrated with electronics based on the self-differencing technique that increases avalanche discrimination sensitivity. Despite using room temperature detectors, we demonstrate QKD with record secure bit rates over a range of fiber lengths (e.g., 1.26 Mbit/s over 50 km). Furthermore, our results indicate that operating the detectors at room temperature increases the secure bit rate for short distances.

  17. A novel method for one-way hash function construction based on spatiotemporal chaos

    Energy Technology Data Exchange (ETDEWEB)

    Ren Haijun [College of Software Engineering, Chongqing University, Chongqing 400044 (China); State Key Laboratory of Power Transmission Equipment and System Security and New Technology, Chongqing University, Chongqing 400044 (China)], E-mail: jhren@cqu.edu.cn; Wang Yong; Xie Qing [Key Laboratory of Electronic Commerce and Logistics of Chongqing, Chongqing University of Posts and Telecommunications, Chongqing 400065 (China); Yang Huaqian [Department of Computer and Modern Education Technology, Chongqing Education of College, Chongqing 400067 (China)

    2009-11-30

    A novel hash algorithm based on a spatiotemporal chaos is proposed. The original message is first padded with zeros if needed. Then it is divided into a number of blocks each contains 32 bytes. In the hashing process, each block is partitioned into eight 32-bit values and input into the spatiotemporal chaotic system. Then, after iterating the system for four times, the next block is processed by the same way. To enhance the confusion and diffusion effect, the cipher block chaining (CBC) mode is adopted in the algorithm. The hash value is obtained from the final state value of the spatiotemporal chaotic system. Theoretic analyses and numerical simulations both show that the proposed hash algorithm possesses good statistical properties, strong collision resistance and high efficiency, as required by practical keyed hash functions.

  18. Participation rate or informed choice? Rethinking the European key performance indicators for mammography screening.

    Science.gov (United States)

    Strech, Daniel

    2014-03-01

    Despite the intensive controversies about the likelihood of benefits and harms of mammography screening almost all experts conclude that the choice to screen or not to screen needs to be made by the individual patient who is adequately informed. However, the "European guideline for quality assurance in breast cancer screening and diagnosis" specifies a participation rate of 70% as the key performance indicator for mammography screening. This paper argues that neither the existing evidence on benefits and harms, nor survey research with women, nor compliance rates in clinical trials, nor cost-effectiveness ratios justify participation rates as a reasonable performance indicator for preference-sensitive condition such as mammography screening. In contrast, an informed choice rate would be more reasonable. Further research needs to address the practical challenges in assessing informed choice rates.

  19. Rate effects on timing, key velocity, and finger kinematics in piano performance.

    Directory of Open Access Journals (Sweden)

    Simone Dalla Bella

    Full Text Available We examined the effect of rate on finger kinematics in goal-directed actions of pianists. In addition, we evaluated whether movement kinematics can be treated as an indicator of personal identity. Pianists' finger movements were recorded with a motion capture system while they performed melodies from memory at different rates. Pianists' peak finger heights above the keys preceding keystrokes increased as tempo increased, and were attained about one tone before keypress. These rate effects were not simply due to a strategy to increase key velocity (associated with tone intensity of the corresponding keystroke. Greater finger heights may compensate via greater tactile feedback for a speed-accuracy tradeoff that underlies the tendency toward larger temporal variability at faster tempi. This would allow pianists to maintain high temporal accuracy when playing at fast rates. In addition, finger velocity and accelerations as pianists' fingers approached keys were sufficiently unique to allow pianists' identification with a neural-network classifier. Classification success was higher in pianists with more extensive musical training. Pianists' movement "signatures" may reflect unique goal-directed movement kinematic patterns, leading to individualistic sound.

  20. Quantum-Locked Key Distribution at Nearly the Classical Capacity Rate

    Science.gov (United States)

    Lupo, Cosmo; Lloyd, Seth

    2014-10-01

    Quantum data locking is a protocol that allows for a small secret key to (un)lock an exponentially larger amount of information, hence yielding the strongest violation of the classical one-time pad encryption in the quantum setting. This violation mirrors a large gap existing between two security criteria for quantum cryptography quantified by two entropic quantities: the Holevo information and the accessible information. We show that the latter becomes a sensible security criterion if an upper bound on the coherence time of the eavesdropper's quantum memory is known. Under this condition, we introduce a protocol for secret key generation through a memoryless qudit channel. For channels with enough symmetry, such as the d-dimensional erasure and depolarizing channels, this protocol allows secret key generation at an asymptotic rate as high as the classical capacity minus one bit.

  1. More than one way to spin a crystallite: multiple trajectories through liquid crystallinity to solid silk.

    Science.gov (United States)

    Walker, Andrew A; Holland, Chris; Sutherland, Tara D

    2015-06-22

    Arthropods face several key challenges in processing concentrated feedstocks of proteins (silk dope) into solid, semi-crystalline silk fibres. Strikingly, independently evolved lineages of silk-producing organisms have converged on the use of liquid crystal intermediates (mesophases) to reduce the viscosity of silk dope and assist the formation of supramolecular structure. However, the exact nature of the liquid-crystal-forming-units (mesogens) in silk dope, and the relationship between liquid crystallinity, protein structure and silk processing is yet to be fully elucidated. In this review, we focus on emerging differences in this area between the canonical silks containing extended-β-sheets made by silkworms and spiders, and 'non-canonical' silks made by other insect taxa in which the final crystallites are coiled-coils, collagen helices or cross-β-sheets. We compared the amino acid sequences and processing of natural, regenerated and recombinant silk proteins, finding that canonical and non-canonical silk proteins show marked differences in length, architecture, amino acid content and protein folding. Canonical silk proteins are long, flexible in solution and amphipathic; these features allow them both to form large, micelle-like mesogens in solution, and to transition to a crystallite-containing form due to mechanical deformation near the liquid-solid transition. By contrast, non-canonical silk proteins are short and have rod or lath-like structures that are well suited to act both as mesogens and as crystallites without a major intervening phase transition. Given many non-canonical silk proteins can be produced at high yield in E. coli, and that mesophase formation is a versatile way to direct numerous kinds of supramolecular structure, further elucidation of the natural processing of non-canonical silk proteins may to lead to new developments in the production of advanced protein materials.

  2. A Comparison of One-Way and Two-Way Coupling Methods for Numerical Analysis of Fluid-Structure Interactions

    Directory of Open Access Journals (Sweden)

    Friedrich-Karl Benra

    2011-01-01

    Full Text Available The interaction between fluid and structure occurs in a wide range of engineering problems. The solution for such problems is based on the relations of continuum mechanics and is mostly solved with numerical methods. It is a computational challenge to solve such problems because of the complex geometries, intricate physics of fluids, and complicated fluid-structure interactions. The way in which the interaction between fluid and solid is described gives the largest opportunity for reducing the computational effort. One possibility for reducing the computational effort of fluid-structure simulations is the use of one-way coupled simulations. In this paper, different problems are investigated with one-way and two-way coupled methods. After an explanation of the solution strategy for both models, a closer look at the differences between these methods will be provided, and it will be shown under what conditions a one-way coupling solution gives plausible results.

  3. Constant Time Delay: One Way to Provide Positive Behavioral Support for Students with Emotional and Behavioral Disorders

    Science.gov (United States)

    Stevens, Kay B.; Lingo, Amy S.

    2005-01-01

    Teachers of students with emotional and behavioral disorders (EBD) understand conceptually, emotionally, and legally the importance of using research-based procedures as well as positive behavioral supports. One way to provide positive behavioral support for students with EBD is constant time delay (CTD). CTD is an instructional delivery procedure…

  4. Effect of one-way clutch on the nonlinear vibration of belt-drive systems with a continuous belt model

    Science.gov (United States)

    Ding, Hu; Zu, Jean W.

    2013-11-01

    This study focuses on the nonlinear steady-state response of a belt-drive system with a one-way clutch. A dynamic model is established to describe the rotations of the driving pulley, the driven pulley, and the accessory shaft. Moreover, the model considers the transverse vibration of the translating belt spans for the first time in belt-drive systems coupled with a one-way clutch. The excitation of the belt-drive system is derived from periodic fluctuation of the driving pulley. In automotive systems, this kind of fluctuation is induced by the engine firing harmonic pulsations. The derived coupled discrete-continuous nonlinear equations consist of integro-partial-differential equations and piece-wise ordinary differential equations. Using the Galerkin truncation, a set of nonlinear ordinary differential equations is obtained from the integro-partial-differential equations. Applying the Runge-Kutta time discretization, the time histories of the dynamic response are numerically solved for the driven pulley and the accessory shaft and the translating belt spans. The resonance areas of the coupled belt-drive system are determined using the frequency sweep. The effects of the one-way clutch on the belt-drive system are studied by comparing the frequency-response curves of the translating belt with and without one-way clutch device. Furthermore, the results of 2-term and 4-term Galerkin truncation are compared to determine the numerical convergence. Moreover, parametric studies are conducted to understand the effects of the system parameters on the nonlinear steady-state response. It is concluded that one-way clutch not only decreases the resonance amplitude of the driven pulley and shaft's rotational vibration, but also reduces the resonance region of the belt's transverse vibration.

  5. One Way to Holland

    DEFF Research Database (Denmark)

    Marselis, Randi; Schütze, Laura Maria

    2013-01-01

    , Twitter, Flickr as well as the museum’s blog to reach migrant communities in order to collect and share information and stories related to photographs of postcolonial migrants. Through combining these different social media with promotion of the related offline photo exhibition in print media, the museum...

  6. One Way into Culture

    Institute of Scientific and Technical Information of China (English)

    刘娜; 崔春燕

    2008-01-01

    Culture, in a wide sense, is the sum total of material and spiritual products created by man in the historical process of a socialpractice. In a narrow sense, it refers to a social ideology and the political system and constitutional organization corresponding to the ideology.Language has a very special position in this big culture and it cannot be well taught and learnt without the introducing of cultural knowledge. One ofthe effective ways to increase awareness of the euhural is to learn the patterns of western everyday life.

  7. One-way light transport controlled by synthetic magnetic fluxes and {\\mathscr{P}}{\\mathscr{T}}-symmetric resonators

    Science.gov (United States)

    Jin, L.; Wang, P.; Song, Z.

    2017-01-01

    Controlled directional light propagation using optical nonlinearity has previously been proposed. Here, we propose a one-way optical device with linear elements controlled by synthetic magnetic fluxes. The device consists of two parity–time symmetric side-coupled resonators with balanced gain and loss. The gain and loss break the reflection symmetry and the magnetic fluxes break the transmission symmetry. Through tuning the magnetic fluxes, reflectionless full transmission in one direction and transmissionless full reflection in the opposite direction can be achieved. The device acts as a light-checking valve, preventing wave propagation in one direction. The proposed one-way transporter uses the nonreciprocity induced by non-Hermiticity and magnetic fluxes without applying nonlinearity. We anticipate that our findings will be useful for optical control and manipulation.

  8. Magnetized Epsilon-Near-Zero (ENZ) Structures: Hall Opacity, Hall Transparency, and One-Way Photonic Surface States

    CERN Document Server

    Davoyan, Arthur

    2013-01-01

    We study propagation of transverse-magnetic (TM) electromagnetic waves in the bulk and at the surface of magnetized epsilon-near-zero (ENZ) medium in a Voigt configuration. We reveal that in a certain range of material parameters novel regimes of wave propagation emerge: we show that the transparency of the medium can be altered with the magnetization leading either to magnetically induced Hall opacity or Hall transparency of the ENZ. In our theoretical study, we demonstrate that surface waves at the interface between either a transparent or an opaque Hall medium and a homogeneous medium may, under certain conditions, be predominantly one-way. Moreover, we predict that one-way photonic surface states may exist at the interface of an opaque Hall ENZ and a regular metal, giving rise to a possibility for backscattering immune wave propagation and isolation.

  9. A Hybrid One-Way ANOVA Approach for the Robust and Efficient Estimation of Differential Gene Expression with Multiple Patterns

    OpenAIRE

    Mohammad Manir Hossain Mollah; Rahman Jamal; Norfilza Mohd Mokhtar; Roslan Harun; Md. Nurul Haque Mollah

    2015-01-01

    Background Identifying genes that are differentially expressed (DE) between two or more conditions with multiple patterns of expression is one of the primary objectives of gene expression data analysis. Several statistical approaches, including one-way analysis of variance (ANOVA), are used to identify DE genes. However, most of these methods provide misleading results for two or more conditions with multiple patterns of expression in the presence of outlying genes. In this paper, an attempt ...

  10. 60-GHz integrated-circuit high data rate quadriphase shift keying exciter and modulator

    Science.gov (United States)

    Grote, A.; Chang, K.

    1984-01-01

    An integrated-circuit quadriphase shift keying (QPSK) exciter and modulator have demonstrated excellent performance directly modulating a carrier frequency of 60 GHz with an output phase error of less than 3 degrees and maximum amplitude error of 0.5 dB. The circuit consists of a 60-GHz Gunn VCO phase-locked to a low-frequency reference source, a 4th subharmonic mixer, and a QPSK modlator packaged into a small volume of 1.8 x 2.5 x 0.35 in. The use of microstrip has the advantages of small size, light-weight, and low-cost fabrication. The unit has the potential for multigigabit data rate applications.

  11. Frequency shift keying by current modulation in a MTJ-based STNO with high data rate

    Science.gov (United States)

    Ruiz-Calaforra, A.; Purbawati, A.; Brächer, T.; Hem, J.; Murapaka, C.; Jiménez, E.; Mauri, D.; Zeltser, A.; Katine, J. A.; Cyrille, M.-C.; Buda-Prejbeanu, L. D.; Ebels, U.

    2017-08-01

    Spin torque nano-oscillators are nanoscopic microwave frequency generators which excel due to their large frequency tuning range and agility for amplitude and frequency modulation. Due to their compactness, they are regarded as suitable candidates for applications in wireless communications, where cost-effective and complementary metal-oxide semiconductor-compatible standalone devices are required. In this work, we study the ability of a magnetic-tunnel-junction based spin torque nano-oscillator to respond to a binary input sequence encoded in a square-shaped current pulse for its application as a frequency-shift-keying (FSK) based emitter. We demonstrate that below the limit imposed by the spin torque nano-oscillator intrinsic relaxation frequency, an agile variation between discrete oscillator states is possible. For this kind of devices, we demonstrate FSK up to data rates of 400 Mbps, which is well suited for the application of such oscillators in wireless networks.

  12. Optimal-Rate Coding Theorem For Adversarial Networks in the Public-Key Setting

    CERN Document Server

    Amir, Yair; Ostrovksy, Rafail

    2008-01-01

    In this paper, we establish an optimal-rate (interactive) coding theorem in the public-key setting for synchronous networks in the presence of a malicious poly-time adversary for dynamically changing networks. Namely, even if the majority of the nodes are controlled by a malicious adversary and the topology of the network is changing at each round, then as long as there is some path of non-corrupted nodes connecting the sender and receiver at each round (though this path may change at every round) we construct a protocol with bounded memory per processor that achieves optimal transfer rate and negligible decoding error. This protocol will transmit polynomially many messages of polynomial size with constant overhead per bit. We stress that our protocol assumes no knowledge of which nodes are corrupted nor which path is reliable at any round. Our interactive coding theorem states that our protocol cannot be affected in a meaningful way by any polynomial-time malicious adversary whose goal is to disrupt and dest...

  13. Experimental realization of one-way quantum computing with two-photon four-qubit cluster states.

    Science.gov (United States)

    Chen, Kai; Li, Che-Ming; Zhang, Qiang; Chen, Yu-Ao; Goebel, Alexander; Chen, Shuai; Mair, Alois; Pan, Jian-Wei

    2007-09-21

    We report an experimental realization of one-way quantum computing on a two-photon four-qubit cluster state. This is accomplished by developing a two-photon cluster state source entangled both in polarization and spatial modes. With this special source, we implemented a highly efficient Grover's search algorithm and high-fidelity two-qubit quantum gates. Our experiment demonstrates that such cluster states could serve as an ideal source and a building block for rapid and precise optical quantum computation.

  14. Recent advances in acoustic one-way manipulation%声单向操控研究进展∗

    Institute of Scientific and Technical Information of China (English)

    梁彬; 袁樱; 程建春

    2015-01-01

    电子二极管的发明标志着现代电子学的诞生,在整个人类社会中引起了科技的深刻变革。声波是一种具有非常悠久的研究历史的经典波,却始终被认为仅具有对称的传播形式。若能制造出可像电子二极管控制电流般实现声波单向导通的声学器件,显然将对整个声学研究领域产生重大影响,具有重要的科学意义及应用价值。第一个基于非线性媒质与声子晶体的声二极管利用非线性突破声学互易原理的局限,首次实现了将声能流限制在单一方向上的声整流效应。针对非线性系统转换效率低下的固有缺陷,在线性体系内围绕声单向传播这个重要科学问题开展了一系列理论和实验研究,设计与制备了多种具有特殊结构和性能的线性声学单向结构,在器件的效率、带宽及尺寸方面产生了突破。在声二极管研究的基础上,第一个可以像电子三极管操控电流般对声流进行操控与放大的声三极管理论模型也被提出。本文介绍了声单向传播这一新兴且富有蓬勃生机的研究领域中的主要进展。%Realizations of one-way manipulations in various kinds of energy flux are always highly desirable. The most famous example should be the invention of electric diodes which marked the emergence of modern electronics and resulted in worldwide technology revolutions. Acoustic wave, albeit a classical wave with much longer research history in comparison with the electricity, has long been thought to propagate easily along two opposite directions in any path. Hence it should be intriguing to realize the one-way transmission of acoustic waves by designing the acoustical analogy of electric diodes, which would have deep implications in all the acoustics-based applications and the field of acoustics in general. In this review, we briefly describe recent advances in acoustic one-way manipulation which has become a new frontier

  15. Comparison of one-way and two-way coupled analyses of electromagnetic machines considering magnetic and structural interactions

    Science.gov (United States)

    Nam, Jahyun; Kang, Chiho; Song, Jeongyong; Jang, Gunhee

    2017-05-01

    We compared one-way and two-way coupled analyses of electromagnetic machines considering magnetic and structural interaction to identify the frequency components of magnetic excitation and to determine the structural coupling effects predicted only by the two-way coupled analysis. We developed finite element models of a C-core switch and an electric motor. In the two-way coupled analysis method, the magnetic force calculated by using the Maxwell stress tensor was applied to the structural finite element model to determine the elastic deformation, and the magnetic finite element model was rearranged by means of the moving mesh method to represent the structural elastic deformation. We showed that two-way coupled analysis predicted the excitation frequency of 80 Hz (4 times the input current frequency) of magnetic force in the C-core switch and the excitation frequency of 667 Hz (the first natural frequency of the rotor, corresponding to the translational mode) of magnetic force in the electric motor undergoing rotor eccentricity. We showed that two-way coupled analysis predicted magnetic excitation and its corresponding structural response more accurately than the one-way coupled analysis, especially for electromagnetic machines in which the structural deformation affects magnetic field through variation of the air gap length.

  16. Stellar neutron capture rateskey data for the s process

    Directory of Open Access Journals (Sweden)

    Käppeler F.

    2013-12-01

    Full Text Available Neutron reactions are responsible for the formation of the elements heavier than iron. The corresponding scenarios relate to the He- and C- burning phases of stellar evolution (s process and to supernova explosions (r and p processes. The s process, which is characterized by low neutron densities, operates in or near the valley of β stability and has produced about half of the elemental abundances between Fe and Bi in the solar system and in the Universe. Because the s abundances are essentially determined by the (n, γ cross sections along the reaction path, accurate neutron data constitute the key input for s process studies. Important constraints for the physical conditions at the stellar sites can be inferred by comparison of the abundance patterns from current s-process models with solar system material or presolar grains. The experimental methods for the determination of stellar (n, γ rates are outlined at the example of recent cross section measurements and remaining quests will be discussed with respect to existing laboratory neutron sources and new developments.

  17. The tropical Pacific as a key pacemaker of the variable rates of global warming

    Science.gov (United States)

    Kosaka, Yu; Xie, Shang-Ping

    2016-09-01

    Global mean surface temperature change over the past 120 years resembles a rising staircase: the overall warming trend was interrupted by the mid-twentieth-century big hiatus and the warming slowdown since about 1998. The Interdecadal Pacific Oscillation has been implicated in modulations of global mean surface temperatures, but which part of the mode drives the variability in warming rates is unclear. Here we present a successful simulation of the global warming staircase since 1900 with a global ocean-atmosphere coupled model where tropical Pacific sea surface temperatures are forced to follow the observed evolution. Without prescribed tropical Pacific variability, the same model, on average, produces a continual warming trend that accelerates after the 1960s. We identify four events where the tropical Pacific decadal cooling markedly slowed down the warming trend. Matching the observed spatial and seasonal fingerprints we identify the tropical Pacific as a key pacemaker of the warming staircase, with radiative forcing driving the overall warming trend. Specifically, tropical Pacific variability amplifies the first warming epoch of the 1910s-1940s and determines the timing when the big hiatus starts and ends. Our method of removing internal variability from the observed record can be used for real-time monitoring of anthropogenic warming.

  18. Effect of soil temperature on one-way optical frequency transfer through dense-wavelength-division-multiplexing fibre links

    CERN Document Server

    Pinkert, T J; Jansen, G S M; Dijck, E A; Groeneveld, B G H M; Smets, R; Bosveld, F C; Ubachs, W; Jungmann, K; Eikema, K S E; Koelemeij, J C J

    2014-01-01

    Results of optical frequency transfer over a carrier-grade dense-wavelength-division-multiplexing (DWDM) optical fibre network are presented. The relation between soil temperature changes on a buried optical fibre and frequency changes of an optical carrier through the fibre is modelled. Soil temperatures, measured at various depths by the Royal Netherlands Meteorology Institute (KNMI) are compared with observed frequency variations through this model. A comparison of a nine-day record of optical frequency measurements through the 2 x 298 km fibre link with soil temperature data shows qualitative agreement. A soil temperature model is used to predict the link stability over longer periods (days-months-years). We show that one-way optical frequency dissemination is sufficiently stable to distribute and compare e.g. rubidium frequency standards over standard DWDM optical fibre networks.

  19. KANDUNGAN ZAT KIMIA ANORGANIK PADA BEBERAPA PROSES FILTRASI AIR MINUM KEMASAN DAN ISI ULANG MENGGUNAKAN ONE-WAY MANOVA

    Directory of Open Access Journals (Sweden)

    Heruna Tanty

    2010-05-01

    Full Text Available Analysis of chemical substances in some processes an-organic bottled water and drinking water recharge has been done using One Way Manova. Samples originated from springs Ciburial Bogor taken in May 2009 at 10 depots refill drinking water process (AMDIU Around Syahdan and Anggrek Campus of Bina Nusantara University. Reserve osmosis filtration processes and filtration Hollow Fiber and testing of heavy metal contents of five CN, Pb, Mn, Cr, and Cd in the company carried out the bottled water (bottled water PT Buana Cikarang Tirta Abadi. Test results and analysis show that the processed water filtration contains CN, Pb, Mn, Cr, and Cd was lower than that of water filtration was not processed. And drinking water processed by filtration Reserve Osmosis, contains CN, Pb, Mn, Cr, and Cd was lower than that processed by Hollow Fiber Filtration and Granular Activated Charcoal.

  20. Use of endobronchial one-way valves reveals questions on etiology of spontaneous pneumothorax: report of three cases

    Directory of Open Access Journals (Sweden)

    Kwok Hau

    2009-11-01

    Full Text Available Abstract Spontaneous pneumothoraces are believed to arise when air from the supplying airway exit via a ruptured visceral pleural bleb into the pleural cavity. Endobronchial one-way valves (EBVs allow air exit (but not entry from individual segmental airways. Systematic deployment of EBVs was applied to three patients with secondary spontaneous pneumothoraces and persistent airleak. In all cases, balloon-catheter occlusion of the upper lobe bronchus stopped the airleak. EBVs applied to individual upper lobe segmental airways failed to terminate the airleak, which only stopped after placements of multiple EBVs to occlude all upper lobe segments. The observation questions the traditional belief of 'one-airway-one-bleb-one-leak' in spontaneous pneumothorax.

  1. Kandungan Zat Kimia Anorganik Pada Beberapa Proses Filtrasi Air Minum Kemasan dan Isi Ulang Menggunakan One-Way Manova

    Directory of Open Access Journals (Sweden)

    Heruna Tanty

    2010-06-01

    Full Text Available Analysis of chemical substances in some processes an-organic bottled water and drinking water recharge has been done using One Way Manova. Samples originated from springs Ciburial Bogor taken in May 2009 at 10 depots refill drinking water process (AMDIU Around Syahdan and Anggrek Campus of Bina Nusantara University. Reserve osmosis filtration processes and filtration Hollow Fiber and testing of heavy metal contents of five CN, Pb, Mn, Cr, and Cd in the company carried out the bottled water (bottled water PT Buana Cikarang Tirta Abadi. Test results and analysis show that the processed water filtration contains CN, Pb, Mn, Cr, and Cd was lower than that of water filtration was not processed. And drinking water processed by filtration Reserve Osmosis, contains CN, Pb, Mn, Cr, and Cd was lower than that processed by Hollow Fiber Filtration and Granular Activated Charcoal.

  2. Space Weather at Mars: 3-D studies using one-way coupling between the Multi-fluid MHD, M-GITM and M-AMPS models

    Science.gov (United States)

    Dong, Chuanfei

    This dissertation presents numerical simulation results of the solar wind interaction with the Martian upper atmosphere by using three comprehensive 3-D models: the Mars Global Ionosphere Thermosphere Model (M-GITM), the Mars exosphere Monte Carlo model Adaptive Mesh Particle Simulator (M-AMPS), and the BATS-R-US Mars multi-fluid MHD (MF-MHD) model. The coupled framework has the potential to provide improved predictions for ion escape rates for comparison with future data to be returned by the MAVEN mission (2014-2016) and thereby improve our understanding of present day escape processes. Estimates of ion escape rates over Mars history must start from properly validated models that can be extrapolated into the past. This thesis aims to build a model library for the NASA Mars Atmosphere and Volatile EvolutioN (MAVEN) mission, which will thus enhance the science return from the MAVEN mission. In this thesis, we aim to address the following four main scientific questions by adopting the one-way coupled framework developed here: (1) What are the Martian ion escape rates at the current epoch and ancient times? (2) What controls the ion escape processes at the current epoch? How are the ion escape variations connected to the solar cycle, crustal field orientation and seasonal variations? (3) How do the variable 3-D cold neutral thermosphere and hot oxygen corona affect the solar wind-Mars interaction? (4) How does the Martian atmosphere respond to extreme variations (e.g., ICMEs) in the solar wind and its interplanetary environment? These questions are closely related to the primary scientific goals of NASA's MAVEN mission and European Space Agency's Mars Express (MEX) mission. We reasonably answer all these four questions at the end of this thesis by employing the one-way coupled framework and comparing the simulation results with both MEX and MAVEN observational data.

  3. Comparing One-way and Two-way Coupled Hydrometeorological Forecasting Systems for Flood Forecasting in the Mediterranean Region

    Science.gov (United States)

    Givati, Amir; Gochis, David; Rummler, Thomas; Kunstmann, Harald; Yu, Wei

    2016-04-01

    A pair of hydro-meteorological modeling systems were calibrated and evaluated for the Ayalon basin in central Israel to assess the advantages and limitations of one-way versus two-way coupled modeling systems for flood prediction. The models used included the Hydrological Engineering Center-Hydrological Modeling System (HEC-HMS) model and the Weather Research and Forecasting (WRF) Hydro modeling system. The models were forced by observed, interpolated precipitation from rain-gauges within the basin, and with modeled precipitation from the WRF atmospheric model. Detailed calibration and evaluation was carried out for two major winter storms in January and December 2013. Then both modeling systems were executed and evaluated in an operational mode for the full 2014/2015 rainy season. Outputs from these simulations were compared to observed measurements from hydrometric stations at the Ayalon basin outlet. Various statistical metrics were employed to quantify and analyze the results: correlation, Root Mean Square Error (RMSE) and the Nash-Sutcliffe (NS) efficiency coefficient. Foremost, the results presented in this study highlight the sensitivity of hydrological responses to different sources of precipitation data, and less so, to hydrologic model formulation. With observed precipitation data both calibrated models closely simulated the observed hydrographs. The two-way coupled WRF/WRF-Hydro modeling system produced improved both the precipitation and hydrological simulations as compared to the one-way WRF simulations. Findings from this study suggest that the use of two-way atmospheric-hydrological coupling has the potential to improve precipitation and, therefore, hydrological forecasts for early flood warning applications. However more research needed in order to better understand the land-atmosphere coupling mechanisms driving hydrometeorological processes on a wider variety precipitation and terrestrial hydrologic systems.

  4. Comparing One-Way and Two-Way Coupled Hydrometeorological Forecasting Systems for Flood Forecasting in the Mediterranean Region

    Directory of Open Access Journals (Sweden)

    Amir Givati

    2016-05-01

    Full Text Available A pair of hydro-meteorological modeling systems were calibrated and evaluated for the Ayalon basin in central Israel to assess the advantages and limitations of one-way versus two-way coupled modeling systems for flood prediction. The models used included the Hydrological Engineering Center-Hydrological Modeling System (HEC-HMS model and the Weather Research and Forecasting (WRF Hydro modeling system. The models were forced by observed, interpolated precipitation from rain-gauges within the basin, and with modeled precipitation from the WRF atmospheric model. Detailed calibration and evaluation was carried out for two major winter storms in January and December 2013. Then, both modeling systems were executed and evaluated in an operational mode for the full 2014/2015 rainy season. Outputs from these simulations were compared to observed measurements from the hydrometric station at the Ayalon basin outlet. Various statistical metrics were employed to quantify and analyze the results: correlation, Root Mean Square Error (RMSE and the Nash–Sutcliffe (NS efficiency coefficient. Foremost, the results presented in this study highlight the sensitivity of hydrological responses to different sources of simulated and observed precipitation data, and demonstrate improvement, although not significant, at the Hydrological response, like simulated hydrographs. With observed precipitation data both calibrated models closely simulated the observed hydrographs. The two-way coupled WRF/WRF-Hydro modeling system produced improved both the precipitation and hydrological simulations as compared to the one-way WRF simulations. Findings from this study, as well as previous studies, suggest that the use of two-way atmospheric-hydrological coupling has the potential to improve precipitation and, therefore, hydrological forecasts for early flood warning applications. However, more research needed in order to better understand the land-atmosphere coupling mechanisms

  5. Rate Regions of Secret Key Sharing in a New Source Model

    CERN Document Server

    Salimi, Somayeh; Aref, Mohammad Reza

    2010-01-01

    A source model for secret key generation between terminals is considered. Two users, namely users 1 and 2, at one side communicate with another user, namely user 3, at the other side via a public channel where three users can observe i.i.d. outputs of correlated sources. Each of users 1 and 2 intends to share a secret key with user 3 where user 1 acts as a wiretapper for user 2 and vice versa. In this model, two situations are considered: communication from users 1 and 2 to user 3 (the forward key strategy) and from user 3 to users 1 and 2 (the backward key strategy). In both situations, the goal is sharing a secret key between user 1 and user 3 while leaking no effective information about that key to user 2, and simultaneously, sharing another secret key between user 2 and user 3 while leaking no effective information about the latter key to user 1. This model is motivated by wireless communications when considering user 3 as a base station and users 1 and 2 as network users. In this paper, for both the forw...

  6. Enhancing the secure key rate in a quantum-key-distribution system using discrete-variable, high-dimensional, time-frequency states

    Science.gov (United States)

    Islam, Nurul T.; Cahall, Clinton; Aragoneses, Andrés.; Lim, Charles Ci Wen; Allman, Michael S.; Verma, Varun; Nam, Sae Woo; Kim, Jungsang; Gauthier, Daniel J.

    2016-10-01

    High-dimensional (dimension d > 2) quantum key distribution (QKD) protocols that encode information in the temporal degree of freedom promise to overcome some of the challenges of qubit-based (d = 2) QKD systems. In particular, the long recovery time of single-photon detectors and large channel noise at long distance both limit the rate at which a final secure key can be generated in a low-dimension QKD system. We propose and demonstrate a practical discrete-variable time-frequency protocol with d = 4 at a wavelength of 1550 nm, where the temporal states are secured by transmitting and detecting their dual states under Fourier transformation, known as the frequency-basis states, augmented by a decoy-state protocol. We show that the discrete temporal and frequency states can be generated and detected using commercially-available equipment with high timing and spectral efficiency. In our initial experiments, we only have access to detectors that have low efficiency (1%) at 1550 nm. Together with other component losses, our system is equivalent to a QKD system with ideal components and a 50-km-long optical-fiber quantum channel. We find that our system maintains a spectral visibility of over 99.0% with a quantum bit error rate of 2.3%, which is largely due to the finite extinction ratio of the intensity modulators used in the transmitter. The estimated secure key rate of this system is 7.7×104 KHz, which should improve drastically when we use detectors optimized for 1550 nm.

  7. One-way domain decomposition method with exact radiation condition and fast GMRES solver for the solution of Maxwell's equations

    Science.gov (United States)

    Stupfel, Bruno; Lecouvez, Matthieu

    2016-10-01

    For the solution of the time-harmonic electromagnetic scattering problem by inhomogeneous 3-D objects, a one-way domain decomposition method (DDM) is considered: the computational domain is partitioned into concentric subdomains on the interfaces of which Robin-type transmission conditions (TCs) are prescribed; an integral representation of the electromagnetic fields on the outer boundary constitutes an exact radiation condition. The global system obtained after discretization of the finite element (FE) formulations is solved via a Krylov subspace iterative method (GMRES). It is preconditioned in such a way that, essentially, only the solution of the FE subsystems in each subdomain is required. This is made possible by a computationally cheap H (curl)- H (div) transformation performed on the interfaces that separate the two outermost subdomains. The eigenvalues of the preconditioned matrix of the system are bounded by two, and optimized values of the coefficients involved in the local TCs on the interfaces are determined so as to maximize the minimum eigenvalue. Numerical experiments are presented that illustrate the numerical accuracy of this technique, its fast convergence, and legitimate the choices made for the optimized coefficients.

  8. Investigation of crystal structures of one-way shape memory Nitinol wire actuators for active steerable needle

    Science.gov (United States)

    Honarvar, Mohammad; Konh, Bardia; Hutapea, Parsaoran

    2015-04-01

    Due to its outstanding properties of Nitinol, known as shape memory and superelasticity, Nitinol wires have been used as actuators in many medical devices. For the medical applications, it is critical to have a consistent strain response of Nitinol wires. This work focuses on studying the effect of parameters such as biased stress, maximum temperature, and wire diameters that influence the strain response of Nitinol wires. Specifically, Nitinol phase transformations were studied from microstructural point of view. The crystal structures of one-way shape memory Nitinol wires of various diameters under different thermomechanical loading conditions were studied using X-Ray Diffraction (XRD) method. The location and intensity of characteristic peaks were determined prior and after the thermomechanical loading cycles. It was observed that Nitinol wires of diameters less than 0.19 mm exhibit unrecovered strain while heated to the range of 70ºC to 80ºC in a thermal cycle, whereas no unrecovered strains were found in larger wires. The observation was supported by the XRD patterns where the formation of R-phase crystal structure was showed in wire diameters less than 0.19 mm at room temperature.

  9. A one-way coupled atmospheric-hydrological modeling system with combination of high-resolution and ensemble precipitation forecasting

    Science.gov (United States)

    Wu, Zhiyong; Wu, Juan; Lu, Guihua

    2016-09-01

    Coupled hydrological and atmospheric modeling is an effective tool for providing advanced flood forecasting. However, the uncertainties in precipitation forecasts are still considerable. To address uncertainties, a one-way coupled atmospheric-hydrological modeling system, with a combination of high-resolution and ensemble precipitation forecasting, has been developed. It consists of three high-resolution single models and four sets of ensemble forecasts from the THORPEX Interactive Grande Global Ensemble database. The former provides higher forecasting accuracy, while the latter provides the range of forecasts. The combined precipitation forecasting was then implemented to drive the Chinese National Flood Forecasting System in the 2007 and 2008 Huai River flood hindcast analysis. The encouraging results demonstrated that the system can clearly give a set of forecasting hydrographs for a flood event and has a promising relative stability in discharge peaks and timing for warning purposes. It not only gives a deterministic prediction, but also generates probability forecasts. Even though the signal was not persistent until four days before the peak discharge was observed in the 2007 flood event, the visualization based on threshold exceedance provided clear and concise essential warning information at an early stage. Forecasters could better prepare for the possibility of a flood at an early stage, and then issue an actual warning if the signal strengthened. This process may provide decision support for civil protection authorities. In future studies, different weather forecasts will be assigned various weight coefficients to represent the covariance of predictors and the extremes of distributions.

  10. Thermal hydraulic studies of spallation target for one-way coupled Indian accelerator driven systems with low energy proton beam

    Indian Academy of Sciences (India)

    V Mantha; A K Mohanty; P Satyamurthy

    2007-02-01

    BARC has recently proposed a one-way coupled ADS reactor. This reactor requires typically ∼ 1 GeV proton beam with 2 mA of current. Approximately 8 kW of heat is deposited in the window of the target. Circulating liquid metal target (lead/lead-bismuth-eutectic) has to extract this heat and this is a critical R&D problem to be solved. At present there are very few accelerators, which can give few mA and high-energy proton beam. However, accelerators with low energy and hundreds of micro-ampere current are commercially available. In view of this, it is proposed in this paper to simulate beam window heating of ∼ 8 kW in the target with low-energy proton beam. Detailed thermal analysis in the spallation and window region has been carried out to study the capability of heat extraction by circulating LBE for a typical target loop with a proton beam of 30 MeV energy and current of 0.267 mA. The heat deposition study is carried out using FLUKA code and flow analysis by CFD code. The detailed analysis of this work is presented in this paper.

  11. Adaptations of protein structure and function to temperature: there is more than one way to 'skin a cat'.

    Science.gov (United States)

    Fields, Peter A; Dong, Yunwei; Meng, Xianliang; Somero, George N

    2015-06-01

    Sensitivity to temperature helps determine the success of organisms in all habitats, and is caused by the susceptibility of biochemical processes, including enzyme function, to temperature change. A series of studies using two structurally and catalytically related enzymes, A4-lactate dehydrogenase (A4-LDH) and cytosolic malate dehydrogenase (cMDH) have been especially valuable in determining the functional attributes of enzymes most sensitive to temperature, and identifying amino acid substitutions that lead to changes in those attributes. The results of these efforts indicate that ligand binding affinity and catalytic rate are key targets during temperature adaptation: ligand affinity decreases during cold adaptation to allow more rapid catalysis. Structural changes causing these functional shifts often comprise only a single amino acid substitution in an enzyme subunit containing approximately 330 residues; they occur on the surface of the protein in or near regions of the enzyme that move during catalysis, but not in the active site; and they decrease stability in cold-adapted orthologs by altering intra-molecular hydrogen bonding patterns or interactions with the solvent. Despite these structure-function insights, we currently are unable to predict a priori how a particular substitution alters enzyme function in relation to temperature. A predictive ability of this nature might allow a proteome-wide survey of adaptation to temperature and reveal what fraction of the proteome may need to adapt to temperature changes of the order predicted by global warming models. Approaches employing algorithms that calculate changes in protein stability in response to a mutation have the potential to help predict temperature adaptation in enzymes; however, using examples of temperature-adaptive mutations in A4-LDH and cMDH, we find that the algorithms we tested currently lack the sensitivity to detect the small changes in flexibility that are central to enzyme adaptation to

  12. What are key determinants of hospital admissions, readmission rate and day case rate within the South African medical schemes population?

    Directory of Open Access Journals (Sweden)

    Nondumiso Gugu Khumalo

    2012-06-01

    Full Text Available  BACKGROUND: In South Africa, private hospitals absorb a high proportion of the total health expenditure on private health care. Between 2008-2010 private hospital expenditure which includes ward fees, theatre fees, consumables, medicines and per diem arrangements consumed between 40.5% and 40.9% of the total benefits paid by medical schemes from the risk pool, whilst in-hospital managed care fees ranged between 1.8% and 2.8% for the equivalent years.OBJECTIVE: The aim of this paper is to highlight key factors contributing to utilisation of hospital services within the medical schemes population and to recommend “appropriate” and cost effective strategies on hospital utilisation management.METHODS: A cross sectional survey informed by retrospective analysis of quantitative data was used. Researchers also triangulated quantitative data with systematic review of literature.RESULTS: The results show that demographic indicators such as age profile, dependency ratio, pensioner ratio and prevalence of chronic conditions are not the only key factors influencing hospital admissions, but rather the effectiveness of each medical scheme in containing hospital admissions is also influenced by available technical capacity on utilisation review and audit as well as the managed care methodology including the philosophy underpinning benefit option design.CONCLUSION: This study highlights the importance of “value based” managed care programs linked to benefit option design in health care utilisation management. The choice of one managed care program over the other often leads to tradeoffs whereby unintended consequences emanate. Medical schemes are therefore encouraged to continuously review their managed care programs to ensure value for money as well as better access and health outcomes.http://dx.doi.org/10.7175/fe.v13i2.207

  13. Challenging the One-Way Paradigm for More Effective Science Communication: A Critical Review of Two Public Campaigns Addressing Contentious Environmental Issues

    Science.gov (United States)

    McEntee, Marie; Mortimer, Claire

    2013-01-01

    This article examines two large-scale public communication campaigns to explore the appropriateness and effectiveness of using one-way communication in contentious environmental issues. The findings show while one-way communication can be successfully employed in contentious issues, it is not appropriate for all contexts and may contribute to…

  14. Challenging the One-Way Paradigm for More Effective Science Communication: A Critical Review of Two Public Campaigns Addressing Contentious Environmental Issues

    Science.gov (United States)

    McEntee, Marie; Mortimer, Claire

    2013-01-01

    This article examines two large-scale public communication campaigns to explore the appropriateness and effectiveness of using one-way communication in contentious environmental issues. The findings show while one-way communication can be successfully employed in contentious issues, it is not appropriate for all contexts and may contribute to…

  15. Two-way against one-way nesting for climate downscaling in Europe and the Mediterranean region using LMDZ4

    Science.gov (United States)

    Li, Shan; Li, Laurent; Le Treut, Hervé

    2016-04-01

    In the 21st century, the estimated surface temperature warming projected by General Circulation Models (GCMs) is between 0.3 and 4.8 °C, depending on the scenario considered. GCMs exhibit a good representation of climate on a global scale, but they are not able to reproduce regional climate processes with the same level of accuracy. Society and policymakers need model projections to define climate change adaptation and mitigation policies on a global, regional and local scale. Climate downscaling is mostly conducted with a regional model nested into the outputs of a global model. This one-way nesting approach is generally used in the climate community without feedbacks from Regional Climate Models (RCMs) to GCMs. This lack of interaction between the two models may affect regional modes of variability, in particular those with a boundary conflict. The objective of this study is to evaluate a two-way nesting configuration that makes an interactive coupling between the RCM and the GCM, an approach against the traditional configuration of one-way nesting system. An additional aim of this work is to examine if the two-way nesting system can improve the RCM performance. The atmospheric component of the IPSL integrated climate model (LMDZ) is configured at both regional (LMDZ-regional) and global (LMDZ-global) scales. The two models have the same configuration for the dynamical framework and the physical forcings. The climatology values of sea surface temperature (SST) are prescribed for the two models. The stretched-grid of LMDZ-global is applied to a region defined by Europe, the Mediterranean, North Africa and Western North Atlantic. To ensure a good statistical significance of results, all simulations last at least 80 years. The nesting process of models is performed by a relaxation procedure of a time scale of 90 minutes. In the case of two-way nesting, the exchange between the two models is every two hours. The relaxation procedure induces a boundary conflict

  16. Investigation of effective thermal conductivity for pebble beds by one-way coupled CFD-DEM method for CFETR WCCB

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Lei [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei, Anhui 230031 (China); University of Science and Technology of China, Hefei, Anhui 230027 (China); Chen, Youhua [University of Science and Technology of China, Hefei, Anhui 230027 (China); Huang, Kai [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei, Anhui 230031 (China); Liu, Songlin, E-mail: slliu@ipp.ac.cn [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei, Anhui 230031 (China); University of Science and Technology of China, Hefei, Anhui 230027 (China)

    2016-05-15

    Highlights: • A CFD-DEM coupled numerical model is built based on the prototypical blanket pebble bed. • The numerical model can be applied to simulate heat transfer of a pebble bed and estimate effective thermal conductivity. • The numerical model agrees well with the theoretical SZB model. • Effective thermal conductivity of pebble beds for WCCB is estimated by the current model. - Abstract: The mono-sized beryllium pebble bed and the multi-sized Li{sub 2}TiO{sub 3}/Be{sub 12}Ti mixed pebble bed are the main schemes for the Water-cooled ceramic breeder blanket (WCCB) of China Fusion Engineering Test Reactor (CFETR). And the effective thermal conductivity (k{sub eff}) of the pebble beds is important to characterize the thermal performance of WCCB. In this study, a one-way coupled CFD-DEM method was employed to simulate heat transfer and estimate k{sub eff}. The geometric topology of a prototypical blanket pebble bed was produced by the discrete element method (DEM). Based on the geometric topology, the temperature distribution and the k{sub eff} were obtained by the computational fluid dynamics (CFD) analysis. The current numerical model presented a good performance to calculate k{sub eff} of the beryllium pebble bed, and according to the modeling of the Li{sub 2}TiO{sub 3}/Be{sub 12}Ti mixed pebble bed, k{sub eff} was estimated with values ranged between 2.0 and 4.0 W/(m∙K).

  17. Retinal rod GTPase turnover rate increases with concentration: a key to the control of visual excitation?

    Science.gov (United States)

    Dratz, E A; Lewis, J W; Schaechter, L E; Parker, K R; Kliger, D S

    1987-07-31

    Guanosine triphosphate (GTP) binding proteins mediate cellular responses to hormones, neurotransmitters, growth factors and light. Activated GTP binding proteins are shut off by GTPase mediated hydrolysis of GTP. Photoreceptor GTPase rates are reported to be 10-50 times too slow to account for electrophysiological recovery time after light stimulus. Recovery rates of other parts of the system, however, appear fast enough. We present evidence that the GTPase rate increases markedly with photoreceptor membrane concentration implying the existence of a diffusible factor controlling the GTPase. When extrapolated to physiological concentrations, the GTPase turnover rate is fast enough (0.25-1.5 sec) to account for the recovery rate of the light stimulated signal of the photoreceptor cells.

  18. Application of VOD Service in One-way CATV Network%VOD 点播业务在广电单向网络中的应用

    Institute of Scientific and Technical Information of China (English)

    钱臣; 栾长青

    2013-01-01

    In the triple play , two-way network transformation is the key to the development of radio and TV network .But the bidirectional transformation need to invest a lot of money , and vigorously carry out two-way business also need to replace the existing set-top boxes , financial pressure is difficult to be sustained in a short time.Like before, only depend on the subscription has been difficult to continue , need to rely on the diversity of value-added services to enhance profitability , this paper mainly introduces the VOD value-added service system to carry out the one-way network environment .%在三网融合的情况下,双向化改造是广电网络发展的重点,但是双向网改需要大量的资金投入,大力开展双向业务还需要更换现有的机顶盒,资金压力在短时间内难以得到缓解,像以前一样单纯依赖收视费已经难以为继,亟需依靠多元化的增值业务以增强盈利能力,为此主要介绍在单向网络环境下开展的VOD增值业务系统。

  19. High-Rate Field Demonstration of Large-Alphabet Quantum Key Distribution

    Science.gov (United States)

    2016-10-12

    by controlling excess noise. Sci. Rep. 6, 19201 (2016). [30] Treiber, A. et al. A fully automated entanglement-based quantum cryptography system for telecom fiber networks . New J. Phys. 11, 045013 (2009). ...research has focused on extending the range of QKD links well beyond 100 km [13–15], deployed QKD networks will include a variety of link lengths with...2009). [14] Wang, S. et al. 2 GHz clock quantum key distribution over 260 km of standard telecom fiber. Opt. Lett. 37, 1008–1010 (2012). [15] Korzh, B

  20. Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment

    Directory of Open Access Journals (Sweden)

    Rameez Asif

    2017-01-01

    Full Text Available There is current significant interest in Fiber-to-the-Home (FTTH networks, that is, end-to-end optical connectivity. Currently, it may be limited due to the presence of last-mile copper wire connections. However, in near future, it is envisaged that FTTH connections will exist, and a key offering would be the possibility of optical encryption that can best be implemented using Quantum Key Distribution (QKD. However, it is very important that the QKD infrastructure is compatible with the already existing networks for a smooth transition and integration with the classical data traffic. In this paper, we report the feasibility of using off-the-shelf telecommunication components to enable high performance Continuous Variable-Quantum Key Distribution (CV-QKD systems that can yield secure key rates in the range of 100 Mbits/s under practical operating conditions. Multilevel phase modulated signals (m-PSK are evaluated in terms of secure key rates and transmission distances. The traditional receiver is discussed, aided by the phase noise cancellation based digital signal processing module for detecting the complex quantum signals. Furthermore, we have discussed the compatibility of multiplexers and demultiplexers for wavelength division multiplexed Quantum-to-the-Home (QTTH network and the impact of splitting ratio is analyzed. The results are thoroughly compared with the commercially available high-cost encryption modules.

  1. Identification of Dual-Rate Sampled Hammerstein Systems with a Piecewise-Linear Nonlinearity Using the Key Variable Separation Technique

    Directory of Open Access Journals (Sweden)

    Ying-Ying Wang

    2015-06-01

    Full Text Available The identification difficulties for a dual-rate Hammerstein system lie in two aspects. First, the identification model of the system contains the products of the parameters of the nonlinear block and the linear block, and a standard least squares method cannot be directly applied to the model; second, the traditional single-rate discrete-time Hammerstein model cannot be used as the identification model for the dual-rate sampled system. In order to solve these problems, by combining the polynomial transformation technique with the key variable separation technique, this paper converts the Hammerstein system into a dual-rate linear regression model about all parameters (linear-in-parameter model and proposes a recursive least squares algorithm to estimate the parameters of the dual-rate system. The simulation results verify the effectiveness of the proposed algorithm.

  2. Eloquence is The Key – the Impact of Monetary Policy Speeches on Exchange Rate Volatility

    Directory of Open Access Journals (Sweden)

    Adrian Cantemir Călin

    2015-06-01

    Full Text Available During the last years the monetary policy initiatives of the main central banks have been profoundly influenced by quantitative easing (QE. Blessing, curse, effective instruments or a simple fad, these unconventional measures have occupied the center stage of academic and public attention. In this context, this paper focuses on a wide set of public speeches delivered by officials belonging to the most relevant central banks. These statements cover a large pallet of topics including areas such as QE, tapering, financial stability, unemployment or interest rates. The aim of this study is to investigate the impact that these speeches have on the volatility of exchange rates. For this purpose, the methodology relies on an econometric event study that incorporates three volatility models and intraday five-minute frequencies. The results indicate the fact that public statements have a clear, evident, significant and robust impact on the observed assets.

  3. Early Mission Orbit Determination Error Analysis Results for Low-Earth Orbiting Missions using TDRSS Differenced One-way Doppler Tracking Data

    Science.gov (United States)

    Marr, Greg C.

    2003-01-01

    Differencing multiple, simultaneous Tracking and Data Relay Satellite System (TDRSS) one-way Doppler passes can yield metric tracking data usable for orbit determination for (low-cost) spacecraft which do not have TDRSS transponders or local oscillators stable enough to allow the one-way TDRSS Doppler tracking data to be used for early mission orbit determination. Orbit determination error analysis results are provided for low Earth orbiting spacecraft for various early mission tracking scenarios.

  4. Science Teaching Experiences in Informal Settings: One Way to Enrich the Preparation Program for Preservice Science Teachers

    Science.gov (United States)

    Hsu, Pei-Ling

    2016-01-01

    The high attrition rate of new science teachers demonstrates the urgent need to incorporate effective practices in teacher preparation programs to better equip preservice science teachers. The purpose of the study is to demonstrate a way to enrich preservice science teachers' preparation by incorporating informal science teaching practice into…

  5. More than one way to be an herbivore: convergent evolution of herbivory using different digestive strategies in prickleback fishes (Stichaeidae).

    Science.gov (United States)

    German, Donovan P; Sung, Aaron; Jhaveri, Parth; Agnihotri, Ritika

    2015-06-01

    In fishes, the evolution of herbivory has occured within a spectrum of digestive strategies, with two extremes on opposite ends: (i) a rate-maximization strategy characterized by high intake, rapid throughput of food through the gut, and little reliance on microbial digestion or (ii) a yield-maximization strategy characterized by measured intake, slower transit of food through the gut, and more of a reliance on microbial digestion in the hindgut. One of these strategies tends to be favored within a given clade of fishes. Here, we tested the hypothesis that rate or yield digestive strategies can arise in convergently evolved herbivores within a given lineage. In the family Stichaeidae, convergent evolution of herbivory occured in Cebidichthys violaceus and Xiphister mucosus, and despite nearly identical diets, these two species have different digestive physiologies. We found that C. violaceus has more digesta in its distal intestine than other gut regions, has comparatively high concentrations (>11 mM) of short-chain fatty acids (SCFA, the endpoints of microbial fermentation) in its distal intestine, and a spike in β-glucosidase activity in this gut region, findings that, when coupled to long retention times (>20 h) of food in the guts of C. violaceus, suggest a yield-maximizing strategy in this species. X. mucosus showed none of these features and was more similar to its sister taxon, the omnivorous Xiphister atropurpureus, in terms of digestive enzyme activities, gut content partitioning, and concentrations of SCFA in their distal intestines. We also contrasted these herbivores and omnivores with other sympatric stichaeid fishes, Phytichthys chirus (omnivore) and Anoplarchus purpurescens (carnivore), each of which had digestive physiologies consistent with the consumption of animal material. This study shows that rate- and yield-maximizing strategies can evolve in closely related fishes and suggests that resource partitioning can play out on the level of

  6. Determination of the extra buffering distance in the one-way nesting procedure for the regional ocean

    Science.gov (United States)

    Hwang, Jin Hwan; Pham, Van Sy

    2017-04-01

    The Big-Brother Experiment (BBE) evaluates the effect of domain size on the ocean regional circulation model (ORCMs) in the downscaling and nesting from the ocean global circulation (OGCMs). The BBE first establishes a mimic ocean global circulation models (M-OGCMs) data and employs a ORCM to simulate for a highly resolved large domain. This M-OGCM's results were then filtered to remove short scales then used for boundary and initial conditions of the nested ORCMs, which have the same resolution to the M-OGCMs. The various sizes of domain were embedded in the M-OGCMs and the cases were simulated to see the effect of domain size with the extra buffering distance to the results of the ORCMs. The diagnostic variables including temperature, salinity and vorticity of the nested domain are then compared with those of the M-OGCMs before filtering. Differences between them can address the errors associating with the sizes of the domain, which are not attributed unambiguously to models errors or observational errors. The results showed that domain size significantly impacts on the results of ORCMs. As the domain size of the ORCM becomes lager, the distance of the extra space between the area of interest and the updated LBCs increases. So, the results of ORCMs perform more highly correlated with the M-OGCM. But, there are a certain optimal sizes of the OGCMs, which could be larger than nested ORCMs' domain size from 2 to 10 times, depending on the computational costs. Key words: domain size, error, ocean regional circulation model, Big-Brother Experiment. Acknowledgement: This research was supported by grants from the Korean Ministry of Oceans and Fisheries entitled "Development of integrated estuarine management system" and a National Research Foundation of Korea (NRF) Grant (No. 2015R1A5A 7037372) funded by MSIP of Korea. The authors thank the Integrated Research Institute of Construction and Environmental Engineering of Seoul National University for administrative support.

  7. Highly resistant macromolecular components and low rate of generation of endogenous damage: two key traits of longevity.

    Science.gov (United States)

    Pamplona, Reinald; Barja, Gustavo

    2007-10-01

    Key characteristics relating oxidative damage to aging and longevity are reviewed. Available information indicates that the specific composition of tissue macromolecules (proteins, lipids and mitochondrial DNA) in long-lived animal species gives them an intrinsically high resistance to modification that likely contributes to the superior longevity of these species. This is obtained in the case of lipids by decreasing fatty acid unsaturation, and in the proteins by lowering their methionine content. Long-lived animals also show low rates of reactive oxygen species (ROS) generation and oxidative damage at their mitochondria. On the other hand, dietary restriction decreases mitochondrial ROS production and oxidative damage to mitochondrial DNA and proteins. These changes are due to the decreased intake of dietary proteins (not of lipids or carbohydrates) of the dietary restricted animals. In turn, these effects of protein restriction seem to be specifically due to the lowered methionine intake of the protein and dietary restricted animals. It is emphasized that both a low rate of generation of endogenous damage and an intrinsically high resistance to modification of tissue macromolecules are key traits of animal longevity.

  8. Free-Space Quantum Key Distribution with a High Generation Rate Potassium Titanyl Phosphate Waveguide Photon-Pair Source

    Science.gov (United States)

    Wilson, Jeffrey D.; Chaffee, Dalton W.; Wilson, Nathaniel C.; Lekki, John D.; Tokars, Roger P.; Pouch, John J.; Roberts, Tony D.; Battle, Philip; Floyd, Bertram M.; Lind, Alexander J.; hide

    2016-01-01

    A high generation rate photon-pair source using a dual element periodically-poled potassium titanyl phosphate (PP KTP) waveguide is described. The fully integrated photon-pair source consists of a 1064-nanometer pump diode laser, fiber-coupled to a dual element waveguide within which a pair of 1064-nanometer photons are up-converted to a single 532-nanometer photon in the first stage. In the second stage, the 532-nanometer photon is down-converted to an entangled photon-pair at 800 nanometer and 1600 nanometer which are fiber-coupled at the waveguide output. The photon-pair source features a high pair generation rate, a compact power-efficient package, and continuous wave (CW) or pulsed operation. This is a significant step towards the long term goal of developing sources for high-rate Quantum Key Distribution (QKD) to enable Earth-space secure communications. Characterization and test results are presented. Details and preliminary results of a laboratory free-space QKD experiment with the B92 protocol are also presented.

  9. The key theorem and the bounds on the rate of uniform convergence of learning theory on Sugeno measure space

    Institute of Scientific and Technical Information of China (English)

    HA Minghu; LI Yan; LI Jia; TIAN Dazeng

    2006-01-01

    Some properties of Sugeno measure are further discussed, which is a kind of typical nonadditive measure. The definitions and properties of random variable and its distribution function, expected value, and variance are then presented. Markov inequality, Chebyshev's inequality and the Khinchine's Law of Large Numbers on Sugeno measure space are also proven. Furthermore, the concepts of empirical risk functional, expected risk functional and the strict consistency of ERM principle on Sugeno measure space are proposed. According to these properties and concepts, the key theorem of learning theory, the bounds on the rate of convergence of learning process and the relations between these bounds and capacity of the set of functions on Sugeno measure space are given.

  10. Species-specific responses to climate change and community composition determine future calcification rates of Florida Keys reefs.

    Science.gov (United States)

    Okazaki, Remy R; Towle, Erica K; van Hooidonk, Ruben; Mor, Carolina; Winter, Rivah N; Piggot, Alan M; Cunning, Ross; Baker, Andrew C; Klaus, James S; Swart, Peter K; Langdon, Chris

    2017-03-01

    Anthropogenic climate change compromises reef growth as a result of increasing temperatures and ocean acidification. Scleractinian corals vary in their sensitivity to these variables, suggesting species composition will influence how reef communities respond to future climate change. Because data are lacking for many species, most studies that model future reef growth rely on uniform scleractinian calcification sensitivities to temperature and ocean acidification. To address this knowledge gap, calcification of twelve common and understudied Caribbean coral species was measured for two months under crossed temperatures (27, 30.3 °C) and CO2 partial pressures (pCO2 ) (400, 900, 1300 μatm). Mixed-effects models of calcification for each species were then used to project community-level scleractinian calcification using Florida Keys reef composition data and IPCC AR5 ensemble climate model data. Three of the four most abundant species, Orbicella faveolata, Montastraea cavernosa, and Porites astreoides, had negative calcification responses to both elevated temperature and pCO2 . In the business-as-usual CO2 emissions scenario, reefs with high abundances of these species had projected end-of-century declines in scleractinian calcification of >50% relative to present-day rates. Siderastrea siderea, the other most common species, was insensitive to both temperature and pCO2 within the levels tested here. Reefs dominated by this species had the most stable end-of-century growth. Under more optimistic scenarios of reduced CO2 emissions, calcification rates throughout the Florida Keys declined reefs, ranging 10-100%. Without considering bleaching, reef growth will likely decline on most reefs, especially where resistant species like S. siderea are not already dominant. This study demonstrates how species composition influences reef community responses to climate change and how reduced CO2 emissions can limit future declines in reef calcification. © 2016 John Wiley

  11. Theory of wave propagation in magnetized near-zero-epsilon metamaterials: evidence for one-way photonic states and magnetically switched transparency and opacity.

    Science.gov (United States)

    Davoyan, Arthur R; Engheta, Nader

    2013-12-20

    We study propagation of transverse-magnetic electromagnetic waves in the bulk and at the surface of a magnetized epsilon-near-zero (ENZ) medium in a Voigt configuration. We reveal that in a certain range of material parameters novel regimes of wave propagation emerge; we show that the transparency of the medium can be altered with the magnetization leading either to magnetically induced Hall opacity or Hall transparency of the ENZ. In our theoretical study, we demonstrate that surface waves at the interface between either a transparent or an opaque Hall medium and a homogeneous medium may, under certain conditions, be predominantly one way. Moreover, we predict that one-way photonic surface states may exist at the interface of an opaque Hall ENZ and a regular metal, giving rise to the possibility for backscattering immune wave propagation and isolation.

  12. Crystal structure of norcoclaurine-6-O-methyltransferase, a key rate-limiting step in the synthesis of benzylisoquinoline alkaloids.

    Science.gov (United States)

    Robin, Adeline Y; Giustini, Cécile; Graindorge, Matthieu; Matringe, Michel; Dumas, Renaud

    2016-09-01

    Growing pharmaceutical interest in benzylisoquinoline alkaloids (BIA) coupled with their chemical complexity make metabolic engineering of microbes to create alternative platforms of production an increasingly attractive proposition. However, precise knowledge of rate-limiting enzymes and negative feedback inhibition by end-products of BIA metabolism is of paramount importance for this emerging field of synthetic biology. In this work we report the structural characterization of (S)-norcoclaurine-6-O-methyltransferase (6OMT), a key rate-limiting step enzyme involved in the synthesis of reticuline, the final intermediate to be shared between the different end-products of BIA metabolism, such as morphine, papaverine, berberine and sanguinarine. Four different crystal structures of the enzyme from Thalictrum flavum (Tf 6OMT) were solved: the apoenzyme, the complex with S-adenosyl-l-homocysteine (SAH), the complexe with SAH and the substrate and the complex with SAH and a feedback inhibitor, sanguinarine. The Tf 6OMT structural study provides a molecular understanding of its substrate specificity, active site structure and reaction mechanism. This study also clarifies the inhibition of Tf 6OMT by previously suggested feedback inhibitors. It reveals its high and time-dependent sensitivity toward sanguinarine.

  13. Genome Alignment Spanning Major Poaceae Lineages Reveals Heterogeneous Evolutionary Rates and Alters Inferred Dates for Key Evolutionary Events.

    Science.gov (United States)

    Wang, Xiyin; Wang, Jingpeng; Jin, Dianchuan; Guo, Hui; Lee, Tae-Ho; Liu, Tao; Paterson, Andrew H

    2015-06-01

    Multiple comparisons among genomes can clarify their evolution, speciation, and functional innovations. To date, the genome sequences of eight grasses representing the most economically important Poaceae (grass) clades have been published, and their genomic-level comparison is an essential foundation for evolutionary, functional, and translational research. Using a formal and conservative approach, we aligned these genomes. Direct comparison of paralogous gene pairs all duplicated simultaneously reveal striking variation in evolutionary rates among whole genomes, with nucleotide substitution slowest in rice and up to 48% faster in other grasses, adding a new dimension to the value of rice as a grass model. We reconstructed ancestral genome contents for major evolutionary nodes, potentially contributing to understanding the divergence and speciation of grasses. Recent fossil evidence suggests revisions of the estimated dates of key evolutionary events, implying that the pan-grass polyploidization occurred ∼96 million years ago and could not be related to the Cretaceous-Tertiary mass extinction as previously inferred. Adjusted dating to reflect both updated fossil evidence and lineage-specific evolutionary rates suggested that maize subgenome divergence and maize-sorghum divergence were virtually simultaneous, a coincidence that would be explained if polyploidization directly contributed to speciation. This work lays a solid foundation for Poaceae translational genomics. Copyright © 2015 The Author. Published by Elsevier Inc. All rights reserved.

  14. The logic of comparative life history studies for estimating key parameters, with a focus on natural mortality rate

    Science.gov (United States)

    Hoenig, John M; Then, Amy Y.-H.; Babcock, Elizabeth A.; Hall, Norman G.; Hewitt, David A.; Hesp, Sybrand A.

    2016-01-01

    There are a number of key parameters in population dynamics that are difficult to estimate, such as natural mortality rate, intrinsic rate of population growth, and stock-recruitment relationships. Often, these parameters of a stock are, or can be, estimated indirectly on the basis of comparative life history studies. That is, the relationship between a difficult to estimate parameter and life history correlates is examined over a wide variety of species in order to develop predictive equations. The form of these equations may be derived from life history theory or simply be suggested by exploratory data analysis. Similarly, population characteristics such as potential yield can be estimated by making use of a relationship between the population parameter and bio-chemico–physical characteristics of the ecosystem. Surprisingly, little work has been done to evaluate how well these indirect estimators work and, in fact, there is little guidance on how to conduct comparative life history studies and how to evaluate them. We consider five issues arising in such studies: (i) the parameters of interest may be ill-defined idealizations of the real world, (ii) true values of the parameters are not known for any species, (iii) selecting data based on the quality of the estimates can introduce a host of problems, (iv) the estimates that are available for comparison constitute a non-random sample of species from an ill-defined population of species of interest, and (v) the hierarchical nature of the data (e.g. stocks within species within genera within families, etc., with multiple observations at each level) warrants consideration. We discuss how these issues can be handled and how they shape the kinds of questions that can be asked of a database of life history studies.

  15. One-way Transmission Tunnel Based on Bell-LaPadula Model%一种基于Bell-LaPadula模型的单向传输通道

    Institute of Scientific and Technical Information of China (English)

    刘波; 陈曙辉

    2012-01-01

    在物理隔离情况下,为确保内部网络的安全,数据只能从低密级网络向高密级网络传输.由于没有信息反馈,单向网络协议使传统数据库同步技术无法生效,且数据在传输过程中极容易发生信息丢失和信息错误.针对这些难点问题,引入BLP安全模型进行分析,在数据库同步和高可靠传输方面提出了安全可靠的解决方案,并对依据该方案设计出来的单向传输通道进行了可用性分析.%In the situation of physical isolation, data can only be transmitted from the low security level network to the high one to ensure the safety of the internal network. Without message feedback,one-way network protocol makes the traditional database synchronization technology unusable,and it is very easy that information loss or information error in the transmission process occur frequently. To solve these problems, this paper analyses the BLP model,and presents a safe and reliable solution in the one-way synchronization of database and high reliable transmission. The a-vailability analysis for the one-way transmission tunnel based on our solution is also provided.

  16. Development of One-way Moisture Transferring Knitted Fabric%单向导湿针织面料的开发

    Institute of Scientific and Technical Information of China (English)

    陈百顺; 郭峰; 何泽寿

    2014-01-01

    从理论分析和具体操作方法上,介绍织物单向导湿的实现方式。通过印花工艺对织物进行微型窗整理,以及利用丙纶的芯吸作用,开发了4款具有单向导湿功能的网眼组织针织面料,并介绍面料的编织生产工艺和印花加工工艺。以5次水洗前后的单向导湿传递指数和芯吸高度来评价织物的吸湿性和导湿性能,结果表明,4款面料均具有良好的单向导湿性能,且没有明显的优劣差异,此种功能产品尤其适合制作高性能的户外运动服装。最后针对单向导湿织物的重点研究方向和存在问题提出了一些建议。%Based on the theoretical analysis and operation methods of one-way moisture transferring of fabric, the paper analyzes the implementing process. It develops 4 kinds of new mesh knitted fabrics with one-way mois-ture transferring function obtained by using printing process (micro-window structure) and wicking of polypropylene. Besides, it introduces in detail the knitting technology and the dyeing and finishing technology. The moisture ab-sorption and transferring property of fabrics is evaluated in terms of wicking height and one-way moisture transfer-ring index before washing and after 5 times’ washing respectively. The results show that the new knitted fabrics have good one-way moisture transferring property, and there are no significant differences between them; this kind of functional product is particularly suitable for the high-performance outdoor sports apparel. Furthermore, the exist-ed problems and future research direction are given.

  17. Generation of high-fidelity four-photon cluster state and quantum-domain demonstration of one-way quantum computing.

    Science.gov (United States)

    Tokunaga, Yuuki; Kuwashiro, Shin; Yamamoto, Takashi; Koashi, Masato; Imoto, Nobuyuki

    2008-05-30

    We experimentally demonstrate a simple scheme for generating a four-photon entangled cluster state with fidelity over 0.860+/-0.015. We show that the fidelity is high enough to guarantee that the produced state is distinguished from Greenberger-Horne-Zeilinger, W, and Dicke types of genuine four-qubit entanglement. We also demonstrate basic operations of one-way quantum computing using the produced state and show that the output state fidelities surpass classical bounds, which indicates that the entanglement in the produced state essentially contributes to the quantum operation.

  18. One-way quantum computing with arbitrarily large time-frequency continuous-variable cluster states from a single optical parametric oscillator

    Science.gov (United States)

    Alexander, Rafael N.; Wang, Pei; Sridhar, Niranjan; Chen, Moran; Pfister, Olivier; Menicucci, Nicolas C.

    2016-09-01

    One-way quantum computing is experimentally appealing because it requires only local measurements on an entangled resource called a cluster state. Record-size, but nonuniversal, continuous-variable cluster states were recently demonstrated separately in the time and frequency domains. We propose to combine these approaches into a scalable architecture in which a single optical parametric oscillator and simple interferometer entangle up to (3 ×103 frequencies) × (unlimited number of temporal modes) into a computationally universal continuous-variable cluster state. We introduce a generalized measurement protocol to enable improved computational performance on this entanglement resource.

  19. Heart rate variability in elite triathletes, is variation in variability the key to effective training? A case comparison.

    Science.gov (United States)

    Plews, Daniel J; Laursen, Paul B; Kilding, Andrew E; Buchheit, Martin

    2012-11-01

    Measures of an athlete's heart rate variability (HRV) have shown potential to be of use in the prescription of training. However, little data exists on elite athletes who are regularly exposed to high training loads. This case study monitored daily HRV in two elite triathletes (one male: 22 year, VO2max 72.5 ml kg min(-1); one female: 20 year, VO2max 68.2 ml kg min(-1)) training 23 ± 2 h per week, over a 77-day period. During this period, one athlete performed poorly in a key triathlon event, was diagnosed as non-functionally over-reached (NFOR) and subsequently reactivated the dormant virus herpes zoster (shingles). The 7-day rolling average of the log-transformed square root of the mean sum of the squared differences between R-R intervals (Ln rMSSD), declined towards the day of triathlon event (slope = -0.17 ms/week; r2 = -0.88) in the NFOR athlete, remaining stable in the control (slope = 0.01 ms/week; r2 = 0.12). Furthermore, in the NFOR athlete, coefficient of variation of HRV (CV of Ln rMSSD 7-day rolling average) revealed large linear reductions towards NFOR (i.e., linear regression of HRV variables versus day number towards NFOR: -0.65%/week and r2 = -0.48), while these variables remained stable for the control athlete (slope = 0.04%/week). These data suggest that trends in both absolute HRV values and day-to-day variations may be useful measurements indicative of the progression towards mal-adaptation or non-functional over-reaching.

  20. Key landscape ecology metrics for assessing climate change adaptation options: rate of change and patchiness of impacts

    Science.gov (United States)

    López-Hoffman, Laura; Breshears, David D.; Allen, Craig D.; Miller, Marc L.

    2013-01-01

    Under a changing climate, devising strategies to help stakeholders adapt to alterations to ecosystems and their services is of utmost importance. In western North America, diminished snowpack and river flows are causing relatively gradual, homogeneous (system-wide) changes in ecosystems and services. In addition, increased climate variability is also accelerating the incidence of abrupt and patchy disturbances such as fires, floods and droughts. This paper posits that two key variables often considered in landscape ecology—the rate of change and the degree of patchiness of change—can aid in developing climate change adaptation strategies. We use two examples from the “borderland” region of the southwestern United States and northwestern Mexico. In piñon-juniper woodland die-offs that occurred in the southwestern United States during the 2000s, ecosystem services suddenly crashed in some parts of the system while remaining unaffected in other locations. The precise timing and location of die-offs was uncertain. On the other hand, slower, homogeneous change, such as the expected declines in water supply to the Colorado River delta, will likely impact the entire ecosystem, with ecosystem services everywhere in the delta subject to alteration, and all users likely exposed. The rapidity and spatial heterogeneity of faster, patchy climate change exemplified by tree die-off suggests that decision-makers and local stakeholders would be wise to operate under a Rawlsian “veil of ignorance,” and implement adaptation strategies that allow ecosystem service users to equitably share the risk of sudden loss of ecosystem services before actual ecosystem changes occur. On the other hand, in the case of slower, homogeneous, system-wide impacts to ecosystem services as exemplified by the Colorado River delta, adaptation strategies can be implemented after the changes begin, but will require a fundamental rethinking of how ecosystems and services are used and valued. In

  1. Haemodynamics of giant cerebral aneurysm: A comparison between the rigid-wall, one-way and two-way FSI models

    Science.gov (United States)

    Khe, A. K.; Cherevko, A. A.; Chupakhin, A. P.; Bobkova, M. S.; Krivoshapkin, A. L.; Orlov, K. Yu

    2016-06-01

    In this paper a computer simulation of a blood flow in cerebral vessels with a giant saccular aneurysm at the bifurcation of the basilar artery is performed. The modelling is based on patient-specific clinical data (both flow domain geometry and boundary conditions for the inlets and outlets). The hydrodynamic and mechanical parameters are calculated in the frameworks of three models: rigid-wall assumption, one-way FSI approach, and full (two-way) hydroelastic model. A comparison of the numerical solutions shows that mutual fluid- solid interaction can result in qualitative changes in the structure of the fluid flow. Other characteristics of the flow (pressure, stress, strain and displacement) qualitatively agree with each other in different approaches. However, the quantitative comparison shows that accounting for the flow-vessel interaction, in general, decreases the absolute values of these parameters. Solving of the hydroelasticity problem gives a more detailed solution at a cost of highly increased computational time.

  2. The Roland De Witte Experiment, R. T. Cahill, and the One-Way Speed of Light (Letters to Progress in Physics

    Directory of Open Access Journals (Sweden)

    Catania J.

    2016-01-01

    Full Text Available In “The Roland De Witte 1991 Experiment (to the Memory of Roland De Witte” (Progr. Phys , 2006, v. 2(3, 60–65, R.T. Cahill gives us a briefing on his view that interferometer measurements and one-way RF coaxial cable propagation-time measure- ments amount to a detection of the anisotropy in the speed of light. However, while I obtain first order propagation delays in calculations for on e-way transit which would show geometric modulation by Earth’s rotation, I do not agree with Cahill’s simplistic equation that relates the modulation solely to the projection of the absolute velocity vector v on the coaxial cable, called v P by Cahill (ibid., p. 61–62. The reader should be warned that Cahill’s equation for ∆ t (ibid., p.63 is crude compared with a full Special Relativistic derivation.

  3. Tailored One-Way and Two-Way Shape Memory Capabilities of Poly(ɛ-Caprolactone)-Based Systems for Biomedical Applications

    Science.gov (United States)

    Pandini, Stefano; Riccò, Theonis; Borboni, Alberto; Bodini, Ileana; Vetturi, David; Cambiaghi, Danilo; Toselli, Maurizio; Paderni, Katia; Messori, Massimo; Pilati, Francesco; Chiellini, Federica; Bartoli, Cristina

    2014-07-01

    This paper investigates the shape memory capabilities of semicrystalline networks, focusing the attention on poly(ɛ-caprolactone) (PCL) systems, a class of materials that allows to satisfy important requirements for their applications as biomedical devices, such as the good biocompatibility, the fast recovery of large "temporary" shape configurations, and the easy tailoring of the transformation temperatures. The materials were prepared with various crosslink densities and crosslinking methodologies; in particular, beside a thermal crosslinking based on reactive methacrylic end groups, a novel type of covalently crosslinked semicrystalline systems was prepared by a sol-gel approach from alkoxysilane-terminated PCL precursors, so as to avoid potentially toxic additives typically used for free-radical thermal curing. The materials were subjected to biological tests, to study their ability in sustaining cell adhesion and proliferation, and to thermal characterizations, to evaluate the possibility to tailor their melting and crystallization temperatures. The one-way shape memory (i.e., the possibility to set the material in a given configuration and to recover its pristine shape) and the two-way shape memory response (i.e., the triggered change between two distinguished shapes on the application of an on-off stimulus) were studied by applying optimized thermo-mechanical cyclic histories. The ability to fix the applied shape and to recover the original one on the application of heating (i.e., the one-way effect) was evaluated on tensile bars; further, to investigate a potential application as self-expandable stents, isothermal shape memory experiments were carried out also on tubular specimens, previously folded in a temporary compact configuration. The two-way response was studied through the application of a constant load and of a heating/cooling cycle from above melting to below the crystallization temperature, leading to a reversible elongation/contraction effect

  4. Mechanism of one-way traffic of hexameric phi29 DNA packaging motor with four electropositive relaying layers facilitating antiparallel revolution.

    Science.gov (United States)

    Zhao, Zhengyi; Khisamutdinov, Emil; Schwartz, Chad; Guo, Peixuan

    2013-05-28

    The importance of nanomotors in nanotechnology is akin to that of mechanical engines to daily life. The AAA+ superfamily is a class of nanomotors performing various functions. Their hexagonal arrangement facilitates bottom-up assembly for stable structures. The bacteriophage phi29 DNA translocation motor contains three coaxial rings: a dodecamer channel, a hexameric ATPase ring, and a hexameric pRNA ring. The viral DNA packaging motor has been believed to be a rotational machine. However, we discovered a revolution mechanism without rotation. By analogy, the earth revolves around the sun while rotating on its own axis. One-way traffic of dsDNA translocation is facilitated by five factors: (1) ATPase changes its conformation to revolve dsDNA within a hexameric channel in one direction; (2) the 30° tilt of the channel subunits causes an antiparallel arrangement between two helices of dsDNA and channel wall to advance one-way translocation; (3) unidirectional flow property of the internal channel loops serves as a ratchet valve to prevent reversal; (4) 5'-3' single-direction movement of one DNA strand along the channel wall ensures single direction; and (5) four electropositive layers interact with one strand of the electronegative dsDNA phosphate backbone, resulting in four relaying transitional pauses during translocation. The discovery of a riding system along one strand provides a motion nanosystem for cargo transportation and a tool for studying force generation without coiling, friction, and torque. The revolution of dsDNA among 12 subunits offers a series of recognition sites on the DNA backbone to provide additional spatial variables for nucleotide discrimination for sensing applications.

  5. Adaptation of methodology to select structural alternatives of one-way slab in residential building to the guidelines of the European Committee for Standardization (CEN/TC 350)

    Energy Technology Data Exchange (ETDEWEB)

    Fraile-Garcia, Esteban, E-mail: esteban.fraile@unirioja.es [University of La Rioja, Department of Mechanical Engineering (Spain); Ferreiro-Cabello, Javier, E-mail: javier.ferreiro@unirioja.es [University of La Rioja, Department of Mechanical Engineering (Spain); Qualiberica S.L. (Spain); Martinez-Camara, Eduardo, E-mail: eduardo.martinezc@unirioja.es [University of La Rioja, Department of Mechanical Engineering (Spain); Jimenez-Macias, Emilio, E-mail: emilio.jimenez@unirioja.es [University of La Rioja, Department of Electrical Engineering (Spain)

    2015-11-15

    The European Committee for Standardization (CEN) through its Technical Committee CEN/TC-350 is developing a series of standards for assessing the building sustainability, at both product and building levels. The practical application of the selection (decision making) of structural alternatives made by one-way slabs leads to an intermediate level between the product and the building. Thus the present study addresses this problem of decision making, following the CEN guidelines and incorporating relevant aspects of architectural design into residential construction. A life cycle assessment (LCA) is developed in order to obtain valid information for the decision making process (the LCA was developed applying CML methodology although Ecoindicator99 was used in order to facilitate the comparison of the values); this information (the carbon footprint values) is contrasted with other databases and with the information from the Environmental Product Declaration (EPD) of one of the lightening materials (expanded polystyrene), in order to validate the results. Solutions of different column disposition and geometries are evaluated in the three pillars of sustainable construction on residential construction: social, economic and environmental. The quantitative analysis of the variables used in this study enables and facilitates an objective comparison in the design stage by a responsible technician; the application of the proposed methodology reduces the possible solutions to be evaluated by the expert to 12.22% of the options in the case of low values of the column index and to 26.67% for the highest values. - Highlights: • Methodology for selection of structural alternatives in buildings with one-way slabs • Adapted to CEN guidelines (CEN/TC-350) for assessing the building sustainability • LCA is developed in order to obtain valid information for the decision making process. • Results validated comparing carbon footprint, databases and Env. Product Declarations

  6. Mechanism of One-Way Traffic of Hexameric Phi29 DNA Packaging Motor with Four Electropositive Relaying Layers Facilitating Antiparallel Revolution

    Science.gov (United States)

    2013-01-01

    The importance of nanomotors in nanotechnology is akin to that of mechanical engines to daily life. The AAA+ superfamily is a class of nanomotors performing various functions. Their hexagonal arrangement facilitates bottom-up assembly for stable structures. The bacteriophage phi29 DNA translocation motor contains three coaxial rings: a dodecamer channel, a hexameric ATPase ring, and a hexameric pRNA ring. The viral DNA packaging motor has been believed to be a rotational machine. However, we discovered a revolution mechanism without rotation. By analogy, the earth revolves around the sun while rotating on its own axis. One-way traffic of dsDNA translocation is facilitated by five factors: (1) ATPase changes its conformation to revolve dsDNA within a hexameric channel in one direction; (2) the 30° tilt of the channel subunits causes an antiparallel arrangement between two helices of dsDNA and channel wall to advance one-way translocation; (3) unidirectional flow property of the internal channel loops serves as a ratchet valve to prevent reversal; (4) 5′–3′ single-direction movement of one DNA strand along the channel wall ensures single direction; and (5) four electropositive layers interact with one strand of the electronegative dsDNA phosphate backbone, resulting in four relaying transitional pauses during translocation. The discovery of a riding system along one strand provides a motion nanosystem for cargo transportation and a tool for studying force generation without coiling, friction, and torque. The revolution of dsDNA among 12 subunits offers a series of recognition sites on the DNA backbone to provide additional spatial variables for nucleotide discrimination for sensing applications. PMID:23510192

  7. Assessing the Key Processes of Youth-Led Participatory Research: Psychometric Analysis and Application of an Observational Rating Scale

    Science.gov (United States)

    Ozer, Emily J.; Douglas, Laura

    2015-01-01

    Youth-led Participatory Action Research (YPAR)--in which young people conduct research aimed at improving problems in their schools and communities--is increasing in public health, youth development, and education. We report on the development and psychometric testing of the YPAR Process Template (YPT)--to assess the quality of key YPAR processes…

  8. The role of dose rate in radiation cancer risk: evaluating the effect of dose rate at the molecular, cellular and tissue levels using key events in critical pathways following exposure to low LET radiation.

    Science.gov (United States)

    Brooks, Antone L; Hoel, David G; Preston, R Julian

    2016-08-01

    This review evaluates the role of dose rate on cell and molecular responses. It focuses on the influence of dose rate on key events in critical pathways in the development of cancer. This approach is similar to that used by the U.S. EPA and others to evaluate risk from chemicals. It provides a mechanistic method to account for the influence of the dose rate from low-LET radiation, especially in the low-dose region on cancer risk assessment. Molecular, cellular, and tissues changes are observed in many key events and change as a function of dose rate. The magnitude and direction of change can be used to help establish an appropriate dose rate effectiveness factor (DREF). Extensive data on key events suggest that exposure to low dose-rates are less effective in producing changes than high dose rates. Most of these data at the molecular and cellular level support a large (2-30) DREF. In addition, some evidence suggests that doses delivered at a low dose rate decrease damage to levels below that observed in the controls. However, there are some data human and mechanistic data that support a dose-rate effectiveness factor of 1. In summary, a review of the available molecular, cellular and tissue data indicates that not only is dose rate an important variable in understanding radiation risk but it also supports the selection of a DREF greater than one as currently recommended by ICRP ( 2007 ) and BEIR VII (NRC/NAS 2006 ).

  9. Time-transfer experiments between satellite laser ranging ground stations via one-way laser ranging to the Lunar Reconnaissance Orbiter

    Science.gov (United States)

    Mao, D.; Sun, X.; Skillman, D. R.; Mcgarry, J.; Hoffman, E.; Neumann, G. A.; Torrence, M. H.; Smith, D. E.; Zuber, M. T.

    2014-12-01

    Satellite laser ranging (SLR) has long been used to measure the distance from a ground station to an Earth-orbiting satellite in order to determine the spacecraft position in orbit, and to conduct other geodetic measurements such as plate motions. This technique can also be used to transfer time between the station and satellite, and between remote SLR sites, as recently demonstrated by the Time Transfer by Laser Link (T2L2) project by the Centre National d'Etudes Spatiaes (CNES) and Observatorire de la Cote d'Azur (OCA) as well as the Laser Time Transfer (LTT) project by the Shanghai Astronomical Observatory, where two-way and one-way measurements were obtained at the same time. Here we report a new technique to transfer time between distant SLR stations via simultaneous one-way laser ranging (LR) to the Lunar Reconnaissance Orbiter (LRO) spacecraft at lunar distance. The major objectives are to establish accurate ground station times and to improve LRO orbit determination via these measurements. The results of these simultaneous LR measurements are used to compare the SLR station times or transfer time from one to the other using times-of-flight estimated from conventional radio frequency tracking of LRO. The accuracy of the time transfer depends only on the difference of the times-of-flight from each ground station to the spacecraft, and is expected to be at sub-nano second level. The technique has been validated by both a ground-based experiment and an experiment that utilized LRO. Here we present the results to show that sub-nanosecond precision and accuracy are achievable. Both experiments were carried out between the primary LRO-LR station, The Next Generation Satellite Laser Ranging (NGSLR) station, and its nearby station, Mobile Laser System (MOBLAS-7), both at Greenbelt, Maryland. The laser transmit time from both stations were recorded by the same event timer referenced to a Hydrogen maser. The results have been compared to data from a common All

  10. Fabrication of cm scale buckypapers of horizontally aligned multiwalled carbon nanotubes highly filled with Fe3C: the key roles of Cl and Ar-flow rates.

    Science.gov (United States)

    Boi, Filippo S; Guo, Jian; Wang, Shanling; He, Yi; Xiang, Gang; Zhang, Xi; Baxendale, Mark

    2016-03-18

    A key challenge in the fabrication of ferromagnetically filled carbon-nanotube buckypapers in the presence of Cl-radicals is the achievement of a preferential horizontal nanotube-alignment. We show that a horizontal-alignment can be achieved by tuning two main CVD parameters for a fixed dichlorobenzene concentration: the precursor-evaporation temperature and the flow rate.

  11. N-dimensional measurement-device-independent quantum key distribution with N + 1 un-characterized sources: zero quantum-bit-error-rate case.

    Science.gov (United States)

    Hwang, Won-Young; Su, Hong-Yi; Bae, Joonwoo

    2016-01-01

    We study N-dimensional measurement-device-independent quantum-key-distribution protocol where one checking state is used. Only assuming that the checking state is a superposition of other N sources, we show that the protocol is secure in zero quantum-bit-error-rate case, suggesting possibility of the protocol. The method may be applied in other quantum information processing.

  12. Combining NASA/JPL One-Way Optical-Fiber Light-Speed Data with Spacecraft Earth-Flyby Doppler-Shift Data to Characterise 3-Space Flow

    CERN Document Server

    Cahill, Reginald T

    2009-01-01

    We combine data from two high precision NASA/JPL experiments: (i) the one-way speed of light experiment using optical fibers: Krisher T.P., Maleki L., Lutes G.F., Primas L.E., Logan R.T., Anderson J.D. and Will C.M., Phys. Rev. D, vol 42, 731-734, 1990, and (ii) the spacecraft earth-flyby doppler shift data: Anderson J.D., Campbell J.K., Ekelund J.E., Ellis J. and Jordan J.F., Phys. Rev. Lett., vol 100, 091102, 2008, to give the solar-system galactic 3-space average speed of 486km/s in the direction RA=4.29hrs, Dec=-75.0deg. Turbulence effects (gravitational waves) are also evident. Data also reveals the 30km/s orbital speed of the earth and the sun inflow component at 1AU of 42km/s and also 615km/s near the sun, and for the first time, experimental measurement of the 3-space 11.2km/s inflow of the earth. The NASA/JPL data is in remarkable agreement with that determined in other light speed anisotropy experiments, such as Michelson-Morley (1887), Miller (1933), DeWitte (1991), Torr and Kolen (1981), Cahill (2...

  13. 单向Hash函数SHA-256的研究与改进%One-way Hash function research and improved SHA-256

    Institute of Scientific and Technical Information of China (English)

    何润民

    2013-01-01

    This paper focuses on the study of the Hash SHA-256 algorithm,analyzes the logic and the compression function of the SHA-256 algorithm.On the basis of the study,it designs an improved Hash function SHA-256,using VC ++ development tools,completed the software implementation.It verifies the improved Hash function SHA-256 has better nonlinearity,one-way,collision resistance,randommess and avalanche effect by the theoretical analysis,realization of software for the string of text file Hash and comparison of the calculation results.%对Hash函数SHA-256进行了研究,分析了SHA-256的算法逻辑,以及它所采用的压缩函数的构造,在此基础上研究设计了一个改进的Hash函数SHA-256,应用VC++开发工具对改进的Hash函数SHA-256完成了软件实现.利用理论分析和实现软件对字符串、文本文件进行Hash计算结果的比较,结果证实改进的Hash函数具有更好的非线性性、单向性、抗碰撞性、伪随机性和雪崩效应.

  14. Enteric-coated mycophenolate sodium: one-way conversion from mycophenolate mofetil and de novo use in stable liver transplant recipients.

    Science.gov (United States)

    Nure, E; Magalini, S C; Frongillo, F; Barbarino, R; Pepe, G; Avolio, A W; Agnes, S

    2009-05-01

    Enteric-coated mycophenolate sodium (EC-MPS) is a formulation of mycophenolic acid (MPA) that releases the active molecule in the intestine reducing drug-related gastrointestinal (GI) side effects. The aim of present work was to summarize the use of EC-MPS for one-way conversion from mycophenolate mofetil (MMF) due to GI side effects and for de novo administration in a stable liver transplant population. In 10 patients on MMF and low-dose calcineurin inhibitors (CNI), significant GI side effects suggested drug conversion to ameliorate subjective symptoms. In 5 patients, EC-MPS was initiated de novo together with reduction of CNI for prevention of long-term renal failure. Conversion was carried out at equivalent MMF/EC-MPS dosages. Reevaluation at 2 months after conversion showed that no episode of rejection or infection occurred, and white blood cell count, CNI levels and doses, and creatinine clearance did not vary significantly. In 70% of converted patients there was a reduction of GI symptoms, especially diarrhea. Eighty percent suspended proton pump inhibitors. The de novo-treated patients showed no significant GI side effects. In conclusion, conversion from MMF to EC-MPS demonstrated significant GI symptom relief and de novo drug administration was well tolerated.

  15. Combining NASA/JPL One-Way Optical-Fiber Light-Speed Data with Spacecraft Earth-Flyby Doppler-Shift Data to Characterise 3-Space Flow

    Directory of Open Access Journals (Sweden)

    Cahill R. T.

    2009-10-01

    Full Text Available We combine data from two high precision NASA / JPL experiments: (i the one-way speed of light experiment using optical fibers: Krisher T.P., Maleki L., Lutes G.F., Pri- mas L.E., Logan R.T., Anderson J.D. and Will C.M. Phys. Rev. D , 1990, v. 42, 731–734, and (ii the spacecraft earth-flyby Doppler shift data: Anderson J.D., Campbell J.K., Ekelund J.E., Ellis J. and Jordan J.F. Phys. Rev. Lett. , 2008, v. 100, 091102, to give the solar-system galactic 3-space average speed of 486 km / s in the direction RA = 4.29 h , Dec = -75.0°. Turbulence effects (gravitational waves are also evident. Data also reveals the 30 km / s orbital speed of the Earth and the Sun inflow component at 1AU of 42 km / s and also 615 km / s near the Sun, and for the first time, experimental measure- ment of the 3-space 11.2 km / s inflow of the Earth. The NASA / JPL data is in remark- able agreement with that determined in other light speed anisotropy experiments, such as Michelson-Morley (1887, Miller (1933, Torr and Kolen (1981, DeWitte (1991, Cahill (2006, Munera (2007, Cahill and Stokes (2008 and Cahill (2009.

  16. Combining NASA/JPL One-Way Optical-Fiber Light-Speed Data with Spacecraft Earth-Flyby Doppler-Shift Data to Characterise 3-Space Flow

    Directory of Open Access Journals (Sweden)

    Cahill R. T.

    2009-10-01

    Full Text Available We combine data from two high precision NASA/JPL experiments: (i the one-way speed of light experiment using optical fibers: Krisher T.P., Maleki L., Lutes G.F., Primas L.E., Logan R.T., Anderson J.D. and Will C.M. Phys. Rev. D, 1990, v.42, 731-734, and (ii the spacecraft earth-flyby Doppler shift data: Anderson J.D., Campbell J.K., Ekelund J.E., Ellis J. and Jordan J.F. Phys. Rev. Lett., 2008, v.100, 091102, to give the solar-system galactic 3-space average speed of 486 km/s in the direction RA = 4.29 h, Dec = -75.0 Deg. Turbulence effects (gravitational waves are also evident. Data also reveals the 30 km/s orbital speed of the Earth and the Sun inflow component at 1AU of 42 km/s and also 615 km/s near the Sun, and for the first time, experimental measurement of the 3-space 11.2 km/s inflow of the Earth. The NASA/JPL data is in remarkable agreement with that determined in other light speed anisotropy experiments, such as Michelson-Morley (1887, Miller (1933, Torr and Kolen (1981, DeWitte (1991, Cahill (2006, Munera (2007, Cahill and Stokes (2008 and Cahill (2009.

  17. Is there more than one way to skin a newt? Convergent toxin resistance in snakes is not due to a common genetic mechanism.

    Science.gov (United States)

    Feldman, C R; Durso, A M; Hanifin, C T; Pfrender, M E; Ducey, P K; Stokes, A N; Barnett, K E; Brodie, E D; Brodie, E D

    2016-01-01

    Convergent evolution of tetrodotoxin (TTX) resistance, at both the phenotypic and genetic levels, characterizes coevolutionary arms races between amphibians and their snake predators around the world, and reveals remarkable predictability in the process of adaptation. Here we examine the repeatability of the evolution of TTX resistance in an undescribed predator-prey relationship between TTX-bearing Eastern Newts (Notophthalmus viridescens) and Eastern Hog-nosed Snakes (Heterodon platirhinos). We found that that local newts contain levels of TTX dangerous enough to dissuade most predators, and that Eastern Hog-nosed Snakes within newt range are highly resistant to TTX. In fact, these populations of Eastern Hog-nosed Snakes are so resistant to TTX that the potential for current reciprocal selection might be limited. Unlike all other cases of TTX resistance in vertebrates, H. platirhinos lacks the adaptive amino acid substitutions in the skeletal muscle sodium channel that reduce TTX binding, suggesting that physiological resistance in Eastern Hog-nosed Snakes is conferred by an alternate genetic mechanism. Thus, phenotypic convergence in this case is not due to parallel molecular evolution, indicating that there may be more than one way for this adaptation to arise, even among closely related species.

  18. One-Way Multishape-Memory Effect and Tunable Two-Way Shape Memory Effect of Ionomer Poly(ethylene-co-methacrylic acid).

    Science.gov (United States)

    Lu, Lu; Li, Guoqiang

    2016-06-15

    Reversible elongation by cooling and contraction by heating, without the need for repeated programming, is well-known as the two-way shape-memory effect (2W-SME). This behavior is contrary to the common physics-contraction when cooling and expansion when heating. Materials with such behavior may find many applications in real life, such as self-sufficient grippers, fastening devices, optical gratings, soft actuators, and sealant. Here, it is shown that ionomer Surlyn 8940, a 50-year old polymer, exhibits both one-way multishape-memory effects and tunable two-way reversible actuation. The required external tensile stress to trigger the tunable 2W-SME is very low when randomly jumping the temperatures within the melting transition window. With a proper one-time programming, "true" 2W-SME (i.e., 2W-SME without the need for an external tensile load) is also achieved. A long training process is not needed to trigger the tunable 2W-SME. Instead, a proper one-time tensile programming is sufficient to trigger repeated and tunable 2W-SME. Because the 2W-SME of the ionomer Surlyn is driven by the thermally reversible network, here crystallization and melting transitions of the semicrystalline poly(ethylene-co-methacrylic acid), it is believed that a class of thermally reversible polymers should also exhibit tunable 2W-SMEs.

  19. Einstein's physical geometry at play: inertial motion, the boostability assumption, the Lorentz transformations, and the so-called conventionality of the one-way speed of light

    CERN Document Server

    Valente, Mario Bacelar

    2013-01-01

    In this work, Einstein's view of geometry as physical geometry is taken into account in the analysis of diverse issues related to the notions of inertial motion and inertial reference frame. Einstein's physical geometry enables a non-conventional view on Euclidean geometry (as the geometry associated to inertial motion and inertial reference frames) and on the uniform time. Also, by taking into account the implications of the view of geometry as a physical geometry, it is presented a critical reassessment of the so-called boostability assumption (implicit according to Einstein in the formulation of the theory) and also of 'alternative' derivations of the Lorentz transformations that do not take into account the so-called 'light postulate'. Finally it is addressed the issue of the eventual conventionality of the one-way speed of light or, what is the same, the conventionality of distant simultaneity (within the same inertial reference frame). It turns out that it is possible to see the (possible) conventionali...

  20. Quantum Public-Key Cryptosystem

    Science.gov (United States)

    Luo, Ming-Xing; Chen, Xiu-Bo; Yun, Deng; Yang, Yi-Xian

    2012-03-01

    Quantum one-way functions play a fundamental role in cryptography because of its necessity for the secure encryption schemes taking into account the quantum computer. In this paper our purpose is to establish a theoretical framework for a candidate of the quantum one-way functions and quantum trapdoor functions based on one-parameter unitary groups. The dynamics of parameterized unitary groups ensure the one-wayness and quantum undistinguishability in different levels, and the physical feasibility are derived from the simultaneous approximation of its infinitesimal generators. Moreover, these special functions are used to construct new cryptosystems-the quantum public-key cryptosystems for encrypting both the classical and quantum information.

  1. High-rate quantum key distribution over 100 km using ultra-low-noise, 2-GHz sinusoidally gated InGaAs/InP avalanche photodiodes.

    Science.gov (United States)

    Namekata, N; Takesue, H; Honjo, T; Tokura, Y; Inoue, S

    2011-05-23

    We have demonstrated quantum key distribution (QKD) over 100 km using single-photon detectors based on InGaAs/InP avalanche photodiodes (APDs). We implemented the differential phase shift QKD (DPS-QKD) protocol with electrically cooled and 2-GHz sinusoidally gated APDs. The single-photon detector has a dark count probability of 2.8 × 10(-8) (55 counts per second) with a detection efficiency of 6 %, which enabled us to achieve 24 kbit/s secure key rate over 100 km of optical fiber. The DPS-QKD system offers better performances in a practical way than those achieved using superconducting single-photon detectors. Moreover, the distance that secure keys against the general individual attacks can be distributed has been extended to 160 km.

  2. One-way coupling of an integrated assessment model and a water resources model: evaluation and implications of future changes over the US Midwest

    Science.gov (United States)

    Voisin, N.; Liu, L.; Hejazi, M.; Tesfa, T.; Li, H.; Huang, M.; Liu, Y.; Leung, L. R.

    2013-11-01

    An integrated model is being developed to advance our understanding of the interactions between human activities, terrestrial system and water cycle, and to evaluate how system interactions will be affected by a changing climate at the regional scale. As a first step towards that goal, a global integrated assessment model, which includes a water-demand model driven by socioeconomics at regional and global scales, is coupled in a one-way fashion with a land surface hydrology-routing-water resources management model. To reconcile the scale differences between the models, a spatial and temporal disaggregation approach is developed to downscale the annual regional water demand simulations into a daily time step and subbasin representation. The model demonstrates reasonable ability to represent the historical flow regulation and water supply over the US Midwest (Missouri, Upper Mississippi, and Ohio river basins). Implications for future flow regulation, water supply, and supply deficit are investigated using climate change projections with the B1 and A2 emission scenarios, which affect both natural flow and water demand. Although natural flow is projected to increase under climate change in both the B1 and A2 scenarios, there is larger uncertainty in the changes of the regulated flow. Over the Ohio and Upper Mississippi river basins, changes in flow regulation are driven by the change in natural flow due to the limited storage capacity. However, both changes in flow and demand have effects on the Missouri River Basin summer regulated flow. Changes in demand are driven by socioeconomic factors, energy and food demands, global markets and prices with rainfed crop demand handled directly by the land surface modeling component. Even though most of the changes in supply deficit (unmet demand) and the actual supply (met demand) are driven primarily by the change in natural flow over the entire region, the integrated framework shows that supply deficit over the Missouri River

  3. Exploration of Mars using Delta Differential One-Way Ranging based on Triangle Libration Points in the Earth-Moon system

    Science.gov (United States)

    Liu, Peng; Tang, Jingshi; Hou, Xiyun; Liu, Lin

    Very Long Baseline Interferometry (VLBI) is a technique that allows determination of angular position for distant radio sources by measuring the geometric time delay between received radio signals at two geographically separated stations. An application of VLBI is spacecraft navigation in space missions where delay measurements of a spacecraft radio signal are compared against similar delay measurements of angularly nearby quasar radio signals. In the case where the spacecraft measurements are obtained from the phases of tones emitted from the spacecraft, first detected separately at each station, and then differenced, this application of VLBI is known as Delta Differential One-Way Ranging (Delta-DOR). Even though data acquisition and processing are not identical for the spacecraft and quasar, they have similar information content and similar sensitivity to sources of error. Consequently, the Delta-DOR can be used in conjunction with Doppler and ranging data to improve spacecraft navigation by more efficiently determining spacecraft angular position in the plane-of-sky. Over the decades, human exploration of Mars have never been stopped. As we know, Delta-DOR began to serve its purpose for Mars Odyssey spacecraft in 2001. In the following years, Delta-DOR was used from Mars Exploration Rover (MER) in 2003-2004 to Mars Science Laboratory (MSL) in 2011, all with excellent results. At present, human exploration of Mars using Delta-DOR technique mainly depends on the Earth-based ground stations. As we know, the differential time delay between the spacecraft and quasar is given approximately by begin{math}Deltatau=-frac{1}{c}BsinTheta_{1}(DeltaTheta_{B}) , the accuracy of the determination of angular separation begin{math}DeltaTheta_{B} improves as the measurement error in the observable begin{math}Deltatau decreases. Further, begin{math}DeltaTheta_{B} accuracy improves as the baseline length B increases. Therefore, the introduction of special libration points, i

  4. TT Mutant Homozygote of Is a Key Factor for Increasing Basal Metabolic Rate and Resting Metabolic Rate in Korean Elementary School Children

    Directory of Open Access Journals (Sweden)

    Jung Ran Choi

    2013-12-01

    Full Text Available We investigated the contribution of genetic variations of KLF5 to basal metabolic rate (BMR and resting metabolic rate (RMR and the inhibition of obesity in Korean children. A variation of KLF5 (rs3782933 was genotyped in 62 Korean children. Using multiple linear regression analysis, we developed a model to predict BMR in children. We divided them into several groups; normal versus overweight by body mass index (BMI and low BMR versus high BMR by BMR. There were no differences in the distributions of alleles and genotypes between each group. The genetic variation of KLF5 gene showed a significant correlation with several clinical factors, such as BMR, muscle, low-density lipoprotein cholesterol, and insulin. Children with the TT had significantly higher BMR than those with CC (p = 0.030. The highest muscle was observed in the children with TT compared with CC (p = 0.032. The insulin and C-peptide values were higher in children with TT than those with CC (p= 0.029 vs. p = 0.004, respectively. In linear regression analysis, BMI and muscle mass were correlated with BMR, whereas insulin and C-peptide were not associated with BMR. In the high-BMR group, we observed that higher muscle, fat mass, and C-peptide affect the increase of BMR in children with TT (p < 0.001, p < 0.001, and p = 0.018, respectively, while Rohrer's index could explain the usual decrease in BMR (adjust r2 = 1.000, p < 0.001, respectively. We identified a novel association between TT of KLF5 rs3782933 and BMR in Korean children. We could make better use of the variation within KLF5 in a future clinical intervention study of obesity.

  5. Sticky or Slippery Wetting: Network Formation Conditions Can Provide a One-Way Street for Water Flow on Platinum-cured Silicone.

    Science.gov (United States)

    Wang, Chenyu; Nair, Sithara S; Veeravalli, Sharon; Moseh, Patricia; Wynne, Kenneth J

    2016-06-01

    -temperature end (slippery surface) but became pinned at the low-temperature end (sticky surface) and did not move when the slide was rotated 180°. The surface was therefore a "one-way street" for water droplet flow. Theory provides fundamental understanding for slippery/sticky behavior for gradient S-PDMS and Pt-PDMS coatings. A model for network formation is based on hydrosilylation at high temperature and condensation curing of Si-OH from autoxidation of Si-H at low temperatures. In summary, network formation conditions strongly affect receding contact angles and water adhesion for Sylgard 184 and the filler-free mimic Pt-PDMS. These findings suggest careful control of curing conditions is important to silicones used in microfluidic devices or as biomedical materials. Network-forming conditions also impact bulk mechanical properties for Sylgard 184, but the range that can be obtained has not been critically examined for specific applications.

  6. Theory Transmission:from One-way to Two-way%从理论的(单向)旅行到(双向)对话

    Institute of Scientific and Technical Information of China (English)

    王宁

    2016-01-01

    长期以来,中国的文学理论批评始终笼罩在西方理论的阴影之下,西方的理论可以通过翻译的中介长驱直入进入中国的文学理论批评话语中。虽然理论的旅行会发生某种变异,但这种旅行和变异长期以来却一直是单向的,也即从西方到东方。美国文学理论家希利斯•米勒最近同时在西方和中国出版的一本演讲集则一改这种理论单向旅行的路径,加进了与中国学者对话的部分,这应该是一个可喜的开端。本文作者认为,中国经济的飞速发展使得中国文化和文学理论走向世界也提到了中国学者的议事日程上。在这方面,米勒与中国学者张江的对话可以说预示了这种理论双向旅行的开始,但是作为中国学者,我们应该积极主动地与西方以及国际主流学者进行交流和对话。也许翻译的中介会使得中国的理论在西方世界发生变异,但是如果中西文论的对话能够持续进行下去,那就是值得的。%For a long time, China’s literary theory and criticism was overshadowed by Western theories. Through translation, Western theories have a clear path to China’s literary critical discourse. There are changes and aberrance during the transmission, but the transmission and aberrance have long been unidirectional: from West to East. J. Hillis Miller, an American literary critic recently published a collection of speeches in the West and China at the same time. The theories do not travel in a one-way system in this book, to which he adds the dialogues between Western theorists and their Chinese counterparts. This marks a good beginning. In this paper, the author holds that the rapid development of Chinese economy allows Chinese scholars to bring Chinese culture and literary theories to the world. In this regard, Miller’s dialogue with Chinese scholar ZHANG Jiang probably signifies the beginning of a two-way transmission of theories

  7. An Efficient Group Key Management Using Code for Key Calculation for Simultaneous Join/Leave: CKCS

    OpenAIRE

    Melisa Hajyvahabzadeh; Elina Eidkhani; S. Anahita Mortazavi; Alireza Nemaney Pour

    2012-01-01

    This paper presents an efficient group key management protocol, CKCS (Code for Key Calculation in Simultaneous join/leave) for simultaneous join/leave in secure multicast. This protocol is based on logical key hierarchy. In this protocol, when new members join the group simultaneously, server sends only thegroup key for those new members. Then, current members and new members calculate the necessary keys by node codes and one-way hash function. A node code is a random number which is assigned...

  8. Chip-based quantum key distribution

    Science.gov (United States)

    Sibson, P.; Erven, C.; Godfrey, M.; Miki, S.; Yamashita, T.; Fujiwara, M.; Sasaki, M.; Terai, H.; Tanner, M. G.; Natarajan, C. M.; Hadfield, R. H.; O'Brien, J. L.; Thompson, M. G.

    2017-02-01

    Improvement in secure transmission of information is an urgent need for governments, corporations and individuals. Quantum key distribution (QKD) promises security based on the laws of physics and has rapidly grown from proof-of-concept to robust demonstrations and deployment of commercial systems. Despite these advances, QKD has not been widely adopted, and large-scale deployment will likely require chip-based devices for improved performance, miniaturization and enhanced functionality. Here we report low error rate, GHz clocked QKD operation of an indium phosphide transmitter chip and a silicon oxynitride receiver chip--monolithically integrated devices using components and manufacturing processes from the telecommunications industry. We use the reconfigurability of these devices to demonstrate three prominent QKD protocols--BB84, Coherent One Way and Differential Phase Shift--with performance comparable to state-of-the-art. These devices, when combined with integrated single photon detectors, pave the way for successfully integrating QKD into future telecommunications networks.

  9. Chip-based quantum key distribution

    Science.gov (United States)

    Sibson, P.; Erven, C.; Godfrey, M.; Miki, S.; Yamashita, T.; Fujiwara, M.; Sasaki, M.; Terai, H.; Tanner, M. G.; Natarajan, C. M.; Hadfield, R. H.; O'Brien, J. L.; Thompson, M. G.

    2017-01-01

    Improvement in secure transmission of information is an urgent need for governments, corporations and individuals. Quantum key distribution (QKD) promises security based on the laws of physics and has rapidly grown from proof-of-concept to robust demonstrations and deployment of commercial systems. Despite these advances, QKD has not been widely adopted, and large-scale deployment will likely require chip-based devices for improved performance, miniaturization and enhanced functionality. Here we report low error rate, GHz clocked QKD operation of an indium phosphide transmitter chip and a silicon oxynitride receiver chip—monolithically integrated devices using components and manufacturing processes from the telecommunications industry. We use the reconfigurability of these devices to demonstrate three prominent QKD protocols—BB84, Coherent One Way and Differential Phase Shift—with performance comparable to state-of-the-art. These devices, when combined with integrated single photon detectors, pave the way for successfully integrating QKD into future telecommunications networks. PMID:28181489

  10. Calcification rates of the massive coral Siderastrea siderea and crustose coralline algae along the Florida Keys (USA) outer-reef tract

    Science.gov (United States)

    Kuffner, I. B.; Hickey, T. D.; Morrison, J. M.

    2013-12-01

    Coral reefs are degrading on a global scale, and rates of reef-organism calcification are predicted to decline due to ocean warming and acidification. Systematic measurements of calcification over space and time are necessary to detect change resulting from environmental stressors. We established a network of calcification monitoring stations at four managed reefs along the outer Florida Keys Reef Tract (FKRT) from Miami to the Dry Tortugas. Eighty colonies (in two sequential sets of 40) of the reef-building coral, Siderastrea siderea, were transplanted to fixed apparatus that allowed repetitive detachment for buoyant weighing every 6 months. Algal-recruitment tiles were also deployed during each weighing interval to measure net calcification of the crustose coralline algal (CCA) community. Coral-calcification rates were an order of magnitude greater than those of CCA. Rates of coral calcification were seasonal (summer calcification was 53 % greater than winter), and corals in the Dry Tortugas calcified 48 % faster than those at the other three sites. Linear extension rates were also highest in the Dry Tortugas, whereas percent area of the coral skeletons excavated by bioeroding fauna was lowest. The spatial patterns in net coral calcification revealed here correlate well with Holocene reef thickness along the FKRT and, in part, support the "inimical waters hypothesis" proposed by Ginsburg, Hudson, and Shinn almost 50 yrs ago to explain reef development in this region. Due to the homogeneity in coral-calcification rates among the three main Keys sites, we recommend refinement of this hypothesis and suggest that water-quality variables (e.g., carbonate mineral saturation state, dissolved and particulate organic matter, light attenuation) be monitored alongside calcification in future studies. Our results demonstrate that our calcification monitoring network presents a feasible and worthwhile approach to quantifying potential impacts of ocean acidification, warming

  11. Calcification rates of the massive coral Siderastrea siderea and crustose coralline algae along the Florida Keys (USA) outer-reef tract

    Science.gov (United States)

    Kuffner, I.B.; Hickey, T.D.; Morrison, J.M.

    2013-01-01

    Coral reefs are degrading on a global scale, and rates of reef-organism calcification are predicted to decline due to ocean warming and acidification. Systematic measurements of calcification over space and time are necessary to detect change resulting from environmental stressors. We established a network of calcification monitoring stations at four managed reefs along the outer Florida Keys Reef Tract (FKRT) from Miami to the Dry Tortugas. Eighty colonies (in two sequential sets of 40) of the reef-building coral, Siderastrea siderea, were transplanted to fixed apparatus that allowed repetitive detachment for buoyant weighing every 6 months. Algal-recruitment tiles were also deployed during each weighing interval to measure net calcification of the crustose coralline algal (CCA) community. Coral-calcification rates were an order of magnitude greater than those of CCA. Rates of coral calcification were seasonal (summer calcification was 53% greater than winter), and corals in the Dry Tortugas calcified 48% faster than those at the other three sites. Linear extension rates were also highest in the Dry Tortugas, whereas percent area of the coral skeletons excavated by bioeroding fauna was lowest. The spatial patterns in net coral calcification revealed here correlate well with Holocene reef thickness along the FKRT and, in part, support the “inimical waters hypothesis” proposed by Ginsburg, Hudson, and Shinn almost 50 yrs ago to explain reef development in this region. Due to the homogeneity in coral-calcification rates among the three main Keys sites, we recommend refinement of this hypothesis and suggest that water-quality variables (e.g., carbonate mineral saturation state, dissolved and particulate organic matter, light attenuation) be monitored alongside calcification in future studies. Our results demonstrate that our calcification monitoring network presents a feasible and worthwhile approach to quantifying potential impacts of ocean acidification

  12. 基于单向哈希函数的证书撤销机制%NEW CERTIFICATE REVOCATION SCHEME BASED ON ONE-WAY HASH-FUNCTION

    Institute of Scientific and Technical Information of China (English)

    李金; 李杰

    2008-01-01

    证书撤销是公钥基础设施PKI(Public Key Infrastructure)研究和应用的难点问题.首先讨论了当前应用最广泛的两类证书撤销机制:证书撤销列表CRL(Certificate Revocation List)和在线证书状态协议OCSP(0nline Certificate Status Protoco1),剖析了这两种机制各自存在的不足.在此基础上,提出了一种基于单向哈希函数的证书撤销机制.

  13. 聚乳酸-羟基乙酸共聚物-壳聚糖单向缓释膜制剂的研究%Preparation of PLGA-CS one-way controlled release membrane

    Institute of Scientific and Technical Information of China (English)

    夏婷; 孙洪范; 马桂蕾; 俞玫

    2015-01-01

    Objective To create a one-way controlled release film carrying drugs for treating diseases without impacting on the surrounding normal tissues. Methods Poly(lactic-co-glycolic acid) (PLGA) and chitosan was used respectively to produce outer film and release film, and the two layers were combined through an intermediary layer. One-way release experiment, protein release and epimedium glycoside release were conducted to evaluate the release behavior. Scanning electron microscopy(SEM) was conducted to determine the change of film microstructure at different release time. Degradation rate was used to determine the physical properties of the film. Cell test and animal test(HE staining) were performed to evaluate the biocompatibility and effectiveness of the drug-release system. Results Release experiments and drug delivery test showed that film was carried different kind of drugs(water-soluble and fat-soluble), which demonstrated one-way controlled release effect. The microstructure of the film was different at different times. After 15 days, the degradation rate was about 96 %. In addition, the film showed good biocompatibility. Epimedium glycoside releasing film was induced the bone marrow mesenchymal stem cell to produce a certain amount of alkaline phosphatase and get differentiated. Conclusion It is demonstrated the drug release film shows good biocompatibility, one-way controlled release behavior and certain therapeutic effectiveness.%目的:研制一种可以携带药物单向作用患处的膜型缓释制剂,避免对周围正常组织产生不良影响。方法昆明小鼠30只,鼠龄6周,雌性,体质量20 g左右。利用聚乳酸-羟基乙酸共聚物(PLGA)和壳聚糖分别制作外层膜和释放膜,通过交联层将2层结合,利用单向释放实验、蛋白释放、淫羊藿苷释放(测定其光密度值)确定膜的单向缓释放性。分别取不同释放时期的膜做扫描电子显微镜观察,确定其在不同释放

  14. 一种基于云平台的测试用例生成方案%One Way of Test Case Generation Based on Cloud Platform

    Institute of Scientific and Technical Information of China (English)

    杜京京; 赵鹏飞

    2014-01-01

    With the rapid development of cloud computing , cloud computing is widely used , software testing is one of them .Soft-ware testing process is always tedious , error-prone and time-consuming , especially in the preparation stage of test cases and test environments .This paper presents a program of test case generation and execution , which starting from UML model diagram for user logic design , processes UML class diagrams to generate test cases , and finally performs these test cases on cloud platform to reduce the burden of program .In this paper , we propose the whole process of building cloud services , elaborate the implementing methods and the challenges , and finally prospect the future research directions and key issues to be solved .%随着云计算快速发展,云计算的应用越来越广泛,软件测试就是其中之一。软件测试是一个烦琐、易错和耗时的过程,特别是在准备测试用例和测试环境阶段。本文提出一个测试用例生成和执行方案,从用户进行逻辑设计的UML模型图出发,基于UML类图进行处理产生测试用例,最后运用云平台来执行这些测试用例,旨在减轻程序的负担。本文提出构建云服务的整个过程,阐述实现的方法和所遇到的挑战,最后展望了未来的研究方向和亟待解决问题。

  15. Determination of Cellular Processing Rates for a Trastuzumab-Maytansinoid Antibody-Drug Conjugate (ADC) Highlights Key Parameters for ADC Design.

    Science.gov (United States)

    Maass, Katie F; Kulkarni, Chethana; Betts, Alison M; Wittrup, K Dane

    2016-05-01

    Antibody-drug conjugates (ADCs) are a promising class of cancer therapeutics that combine the specificity of antibodies with the cytotoxic effects of payload drugs. A quantitative understanding of how ADCs are processed intracellularly can illustrate which processing steps most influence payload delivery, thus aiding the design of more effective ADCs. In this work, we develop a kinetic model for ADC cellular processing as well as generalizable methods based on flow cytometry and fluorescence imaging to parameterize this model. A number of key processing steps are included in the model: ADC binding to its target antigen, internalization via receptor-mediated endocytosis, proteolytic degradation of the ADC, efflux of the payload out of the cell, and payload binding to its intracellular target. The model was developed with a trastuzumab-maytansinoid ADC (TM-ADC) similar to trastuzumab-emtansine (T-DM1), which is used in the clinical treatment of HER2+ breast cancer. In three high-HER2-expressing cell lines (BT-474, NCI-N87, and SK-BR-3), we report for TM-ADC half-lives for internalization of 6-14 h, degradation of 18-25 h, and efflux rate of 44-73 h. Sensitivity analysis indicates that the internalization rate and efflux rate are key parameters for determining how much payload is delivered to a cell with TM-ADC. In addition, this model describing the cellular processing of ADCs can be incorporated into larger pharmacokinetics/pharmacodynamics models, as demonstrated in the associated companion paper.

  16. International key comparison of measurements of neutron source emission rate (1999-2005): CCRI(III)-K9.AmBe

    Science.gov (United States)

    Roberts, N. J.; Jones, L. N.; Wang, Z.; Liu, Y.; Wang, Q.; Chen, X.; Luo, H.; Rong, C.; Králik, M.; Park, H.; Choi, K. O.; Pereira, W. W.; da Fonseca, E. S.; Cassette, P.; Dewey, M. S.; Moiseev, N. N.; Kharitonov, I. A.

    2011-01-01

    Section III (neutron measurements) of the Comité Consultatif des Rayonnements Ionisants, CCRI, conducted a key comparison of primary measurements of the neutron emission rate of an 241Am-Be(α,n) radionuclide source. A single 241Am-Be(α,n) source was circulated to all the participants between 1999 and 2005. Eight laboratories participated—the CIAE (China), CMI (Czech Republic), KRISS (Republic of Korea), LNMRI (Brazil), LNE-LNHB (France), NIST (USA), NPL (UK) and the VNIIM (Russian Federation)—with the NPL making their measurements at the start and repeating them near the end of the exercise to verify the stability of the source. Each laboratory reported the emission rate into 4π sr together with a detailed uncertainty budget. All participants used the manganese bath technique, with the VNIIM also making measurements using an associated particle technique. The CMI, KRISS, VNIIM, and later the NPL, also measured the anisotropy of the source although this was not a formal part of the comparison. The first draft report was released in May 2006 and having been discussed and modified by the participants and subsequently reviewed by the CCRI(III), the present paper is now the final report of the comparison. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCRI Section III, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  17. Improvement and Analysis of One-Way Honing to Inner Ball Surface of Spherical Plain Bearing%关节轴承内圈球面单程珩磨分析与改进

    Institute of Scientific and Technical Information of China (English)

    蔡士源

    2014-01-01

    Based on the one-way honing process of inner surface of spherical plain bearing,the principle of one-way honing and finishing process are analyzed,and the principle defects of one-way honing and finishing are illustrated.A method of the spherical round-trip honing and super-finishing technique to replace the one-way honing is put for-ward,and the function of round-trip honing and working principle and characteristics of super-finishing are expoun-ded.%基于关节轴承内圈球面单程珩磨工艺,分析单程珩磨的原理和光整作用过程,说明了单程珩磨光整的原理性缺陷,提出了替代方法即球面双程珩磨和超精加工技术,并阐述了双程珩磨的作用和超精加工的工作原理及特点。

  18. 提高桧柏成活率关键技术措施%Key Technology for Upgrading Survival Rate of Juniper

    Institute of Scientific and Technical Information of China (English)

    化荣; 顾跃龙; 张月钦

    2012-01-01

    宁夏气候条件恶劣,春季干旱少雨,风沙大,夏季高温干燥,年降水量少,土壤盐碱化程度高。桧柏苗木在移栽时,往往因移植方法不当导致成活率低,不能达到预期的生态景观效果。结合多年的实践经验及在宁夏发电集团新能源研究所绿化施工中的技术总结,摸索出了一些适合宁夏地区提高桧柏成活率的关键技术措施。%The climate conditions in Ningxia are very bad. It is droughty and sandy with little rain in Spring and dry with high temperature in Summer. The annual average precipitation is little and the soil salinization is severe. The survival rate transplantation methods of juniper seedlings was usually low which couldn't achieve expected ecological landscape effect. Based on years of practical experiences and the technological summarization of the greening works at Ningxia Power Generation Group New Energy Institute, some key technology suitable for upgrading the survival rate of juniper in Ningxia area were found out.

  19. Robust and Efficient Sifting-Less Quantum Key Distribution Protocols

    CERN Document Server

    Grosshans, Frédéric

    2009-01-01

    We show that replacing the usual sifting step of the standard quantum-key-distribution protocol BB84 by a one-way reverse reconciliation procedure increases its robustness against photon-number-splitting (PNS) attacks to the level of the SARG04 protocol while keeping the raw key-rate of BB84. This protocol, which uses the same state and detection than BB84, is the m=4 member of a protocol-family using m polarization states which we introduce here. We show that the robustness of these protocols against PNS attacks increases exponentially with m, and that the effective keyrate of optimized weak coherent pulses decreases with the transmission T like T^{1+1/(m-2)}.

  20. ONE WAY ANOVA RANDOMIZED COMPLETE BLOCKS

    African Journals Online (AJOL)

    ******

    2012-04-24

    Apr 24, 2012 ... Effect of rainbow trout growth hormone complementary DNA on body shape, carcass yield, .... injected into mouse brain with lipofectin can be incorporated and expressed by brain ... Gut size in GH- transgenic Coho salmon is ...

  1. One Way to Holland’

    DEFF Research Database (Denmark)

    Marselis, Randi; Schütze, Laura Maria

    2013-01-01

    in these museum practices is the question of how to collaborate with source communities, understood as “groups in the past when artifacts were collected, as well as their descendants today” (Peers & Brown, 2003, p. 2). Collaboration with source communities does not adhere only to “old” collections in ethnographic...

  2. One Way to Holland’

    DEFF Research Database (Denmark)

    Marselis, Randi; Schütze, Laura Maria

    2013-01-01

    , Twitter, Flickr as well as the museum’s blog to reach migrant communities in order to collect and share information and stories related to photographs of postcolonial migrants. Through combining these different social media with promotion of the related offline photo exhibition in print media, the museum......Museums in many parts of the world are challenged by increased diversity within the populations that make up their potential audiences, and many museums of cultural history now acknowledge the culture of ethnic minority groups as an important subject in multiethnic societies. A central issue...

  3. One-Way Temperature Compensated Fiber Link

    Science.gov (United States)

    2011-05-01

    individual compensated links. [1] R. Wynands and S. Weyers, “Atomic Fountain Clocks,” Metrologia , vol. 42, pp. S64-S79, 2005. [2] A. D. Ludlow...3] A. Bauch, et al. ,”Comparison Between Frequency Standards oin Europe and the USA at the 10-15 Uncertainty Level,” Metrologia , vol. 43, pp.109

  4. A multilevel analysis of key forms of community- and individual-level social capital as predictors of self-rated health in the United States.

    Science.gov (United States)

    Kim, Daniel; Kawachi, Ichiro

    2006-09-01

    Communities may be rich or poor in a variety of stocks of social capital. Studies that have investigated relations among these forms and their simultaneous and combined health effects are sparse. Using data on a sample of 24,835 adults (more than half of whom resided in core urban areas) nested within 40 U.S. communities from the Social Capital Benchmark Survey, correlational and factor analyses were applied to determine appropriate groupings among eight key social capital indicators (social trust, informal social interactions, formal group involvement, religious group involvement, giving and volunteering, diversity of friendship networks, electoral political participation, and non-electoral political participation) at each of the community and individual levels. Multilevel logistic regression models were estimated to analyze the associations between the grouped social capital forms and individual self-rated health. Adjusting the three identified community-level social capital groupings/scales for one another and community- and individual-level sociodemographic and socioeconomic characteristics, each of the odds ratios of fair/poor health associated with living in a community one standard deviation higher in the respective social capital form was modestly below one. Being high on all three (vs. none of the) scales was significantly associated with 18% lower odds of fair/poor health (odds ratio = 0.82, 95% confidence interval = 0.69-0.98). Adding individual-level social capital variables to the model attenuated two of the three community-level social capital associations, with a few of the former characteristics appearing to be moderately significantly protective of health. We further observed several significant interactions between community-level social capital and one's proximity to core urban areas, individual-level race/ethnicity, gender, and social capital. Overall, our results suggest primarily beneficial yet modest health effects of key summary forms of

  5. Solar wind interaction with Mars' upper atmosphere: Results from 3-D studies using one-way coupling between the Multi-fluid MHD, the M-GITM and the AMPS models

    Science.gov (United States)

    Dong, C.; Bougher, S. W.; Ma, Y.; Toth, G.; Lee, Y.; Nagy, A. F.; Tenishev, V.; Pawlowski, D. J.; Meng, X.; Combi, M. R.

    2013-12-01

    The study of the solar wind interaction with Mars upper atmosphere/ionosphere has triggered a great of interest in recent years. Among the large number of topics in this research area, the investigation of ion escape fluxes has become increasingly important due to its potential impact on the long-term evolution of Mars atmosphere (e.g., loss of water) over its history. In the present work, we adopt the 3-D Mars cold neutral atmosphere profiles (0~300 km) from the newly developed and validated Mars Global Ionosphere Thermosphere Model (M-GITM) and the 3-D hot oxygen profiles (100km~5RM) from the exosphere Monte Carlo model Adaptive Mesh Particle Simulator (AMPS). We apply these 3-D model outputs fields into the 3-D BATS-R-US Mars multi-fluid MHD model (100km~20RM) that can better simulate the interplay between Mars upper atmosphere and solar wind by considering the dynamics of individual ion species. The multi-fluid model solves separate continuity, momentum and energy equations for each ion species (H+, O+, O2+, CO2+). The M-GITM model together with the AMPS exosphere model take into account the effects of solar cycle and seasonal variations on both cold and hot neutral atmospheres, allowing us to investigate the corresponding effects on the Mars upper atmosphere ion escape by using a one-way coupling approach, i.e., both the M-GITM and AMPS model outputs are used as the inputs for the multi-fluid model and M-GITM is used as input into the AMPS exosphere model. The calculations are carried out for selected cases with different nominal solar wind, solar cycle and crustal field orientation conditions. This work has the potential to provide predictions of ion escape rates for comparison to future data to be returned by the MAVEN primary mission (2014-2016) and thereby improve our understanding of present day escape processes. Acknowledgments: The work presented here was supported by NASA grants NNH10CC04C, NNX09AL26G, NSF grant ATM-0535811.

  6. 大鼠在体单向肠灌流模型研究肉桂酸肠道吸收特性%Study of intestinal absorption of cinnamic acid in one-way intestinal perfusion rat model

    Institute of Scientific and Technical Information of China (English)

    杨本坤; 王素军; 曾洁; 钟运鸣; 臧林泉

    2013-01-01

    Objective To investigate the absorption characteristic of cinnamic acid in rat intestine and the influence of transporter protein on cinnamic acid absorption. Methods One-way intestinal perfusion rat model was established. HPLC was used to measure the content of cinnamon acid in intestine. The absorption rate constant (Ka) and the apparent absorption coefficient ( Peff) were obtained to analyze the absorption kinetics of cinnamon acid. Results The values of Ka and Peff of cinnamic acid in three different regions of rat intestine showed duodenum > jejunum > ileum. The values of Ka and Peff in the same region with different concentrations of cinnamic acid did not show a statistical difference. The values of Ka and Peff of cinnamic acid did not change when treated with MRP2 inhibitor (domethacin) in jejunum, but which significantly increased when treated with Pgp inhibitor ( verapamil hydrochloride) in duodenum. Conclusion Duodenum and jejunum may be the main sites of cinnamic acid absorption, by which mechanism is related to passive diffusion influenced by Pgp,but not MRP2.%目的 研究肉桂酸在大鼠肠道的吸收部位和吸收机制,以及转运蛋白对肉桂酸肠道吸收的影响.方法 建立在体单向肠灌流模型,采用HPLC法测定肉桂酸在肠道中的浓度变化,通过吸收速度常数(Ka)和表观吸收系数(Peff)来研究肉桂酸的吸收动力学特征.结果 肉桂酸在各个肠段的Ka和Peff结果为十二指肠>空肠>回肠,十二指肠和空肠的Ka和Peff值显著性高于回肠(P<0.05),不同浓度肉桂酸在同一肠段的Ka和Peff值差异无统计学意义,加入MRP2抑制剂(吲哚美辛)后Ka和Peff值差异亦无统计学意义,但加入Pgp抑制剂(盐酸维拉帕米)后其值则显著性增加.结论 十二指肠、空肠是肉桂酸吸收的主要部位,吸收机制为被动转运,肠道转运受Pgp转运蛋白的影响,但不受MRP2转运蛋白的影响.

  7. Linear Regression Analysis on Proportion of One-Way Ticket Use in Chengdu Metro%成都地铁单程票使用比例的线性回归分析

    Institute of Scientific and Technical Information of China (English)

    蔡靓

    2012-01-01

    Proportion of one-way ticket use in the subway not only relates to passenger purchasing of tickets,journey time,but also relates to AFC use efficiency and life of mechanical components of equipment,having a direct impact on pressure of ticketing operations.Forecast on proportion of one-way ticket offers great help for ticket marketing and decision- making on passenger traffic organization.Establishing a mathematical model for one-way ticket use proportion also plays a guiding role for the future of ticketing operation statistics.%单程票的使用比例不仅关系到地铁乘客出行的购票、乘车时间,还关系到AFC系统的使用效率和设备机械部件的寿命,对票务运营的压力也产生直接的影响。预测单程票使用比例对票务营销、客运组织决策有很大帮助。针对单程票使用比例建立数学模型,为今后的票务运营统计工作起一定的指导作用。

  8. Applications of single-qubit rotations in quantum public-key cryptography

    OpenAIRE

    Nikolopoulos, Georgios M.

    2008-01-01

    We discuss cryptographic applications of single-qubit rotations from the perspective of trapdoor one-way functions and public-key encryption. In particular, we present an asymmetric cryptosystem whose security relies on fundamental principles of quantum physics. A quantum public key is used for the encryption of messages while decryption is possible by means of a classical private key only. The trapdoor one-way function underlying the proposed cryptosystem maps integer numbers to quantum stat...

  9. Study of Intestinal Absorption of Emodin in One-way Intestinal Perfusion Rat Model%在体单向肠灌流模型研究大黄素的大鼠肠吸收特性

    Institute of Scientific and Technical Information of China (English)

    张艳; 王平; 王进荣; 于宜平; 孟宪丽

    2012-01-01

    目的 研究大黄素在大鼠不同肠段的吸收特性,以及P-糖蛋白(P-gp)和多药耐药相关蛋白(MRP2)对大黄素肠吸收的影响.方法 采用大鼠在体单向肠灌流模型,HPLC法测定肠灌流液中大黄素的浓度,计算不含抑制剂药物组及含抑制剂药物组大黄素的吸收速率常数(Ka)和表观吸收系数(Papp).结果 十二指肠段吸收能力显著强于其他肠段(P<0.05);大黄素在回肠、结肠、空肠段之间的吸收差异无统计学意义(P>0.05);加入P-gp 抑制剂后,大黄素肠吸收的Ka、Papp 值与不合抑制剂组比较差异也没有统计学意义(P>0.05);加入高、中浓度MRP2抑制剂后,大黄素肠吸收的Ka、Papp 值与不含抑制剂组比较,差异均有统计学意义(P<0.01),且有剂量依赖性.结论 大黄素在大鼠体内的主要吸收部位为十二指肠.大黄素的肠吸收过程不受P-gp的外排影响,但受到MRP2的肠道外排转运影响,大黄素可能为MRP2的底物.%Objective To investigate the absorption characteristic of emodin in rats intestine and to observe the impact of P-glycoprotein(P-gp) and multidrug resistance-associated protein( MRP2) on intestinal absorption of emodin. Methods The rat one-way intestinal perfusion model was used. The concentration of emodin was determined by RP-HPLC. The absorption rate constant(Kα) and the apparent absorption coefficient(Papp) in each intestinal section were calculated in rats with or without P-gp inhibilor(verapamil hydrochloride) or MRP2 inhibitor(indomethacin). Results The value of Ka and Papp in the duodenum was signifcantly higher than in other intestinal sections(P 0.05). Compared with the group without inhibitor, the value of Ka and Papp had signifcantly increased(P 0.05) affter adding the inhibitor of P-gp. Conclusion The main absorption position of emodin is in the duodenum of rats. P-gp has no effect on the intestinal absorption of emodin, but MRP2 can promote the intestinal absorption of

  10. 单向活瓣补片治疗合并重度肺动脉高压双向分流型室间隔缺损%One - way - valved patch for repair of ventricular septal defect with severe pulmonary hypertension with Bi-directional shunt

    Institute of Scientific and Technical Information of China (English)

    邵双印

    2009-01-01

    目的 总结本院自2003年至2008年用自制单向活瓣补片治疗合并重度肺动脉高压双向分流型室间隔缺损15例的经验.方法 对收治的15例合并重度肺动脉高压双向分流的室间隔缺损患者行单向活瓣补片修补室间隔缺损.结果 本组15例病人无手术死亡,疗效满意,1周时有7例右向左分流,3周时右向左分流消失.随访3个月病人自觉症状改善,肺动脉压下降.结论 单向活瓣补片能降低肺动脉高压危象的发生率,降低围术期死亡率,围术期的管理也非常重要.%Objective To summerize the surgical effect with one - way - valved patch to treat vetricular septal de-feet with severe pulmonary hypertension with bi - directional shunt since 2003. Methods The materials of 15 patients with ventricular septal defect and severe PH with bi- directional shunt who were treated by one- way- valved patch were ana-lyzed. Results No patient died in hospital after operation due to pulmonary hypertention crisis and the low output of left ventrical. Most patients felt better than preoperation and their pulmonary artery pressure decreased gradually. Conclusions One -way -valved patch is useful in decreasing the rate of perioparative pulmonary hypertension crisis and perioperation mortality. The perioperative therapy and prioperative evaluation are also essential to raise surgical operation effect.

  11. One-Way Traffic Organization Optimization Method Based on Network Impedance and Traffic Efficiency%基于路网阻抗及交通效率的单向交通组织优化方法

    Institute of Scientific and Technical Information of China (English)

    张胜凯; 黄文娟; 韩高峰

    2012-01-01

    To improve the utilization of branch roads and reduce the traffic pressure on arterial roads, the optimization approach of one-way traffic organization is proposed from the view of reducing network impedance and improving traffic efficiency. The bievel programming model is developed with the objective of minimizing network impedance and travel time. The minimum objectixie value of the upper model is obtained by optimizing one-way traffic, and the lower one adopts the capacity limitation-incremental loading method to distribute traffic flow. Through establishing virtual road network, the effectiveness of one-way traffic organization is proved by comparing the network impedance and travel time before and after optimization.%为提高支路的利用率,以降低主干道的交通压力,从降低路网阻抗及提高交通效率的角度出发,提出单向交通组织的优化方法。建立以路网阻抗及出行时间最小化为目标的双层优化模型,其中上层模型通过优化支路的单向交通组织方案使得目标值达到最小,下层模型按照容量限制——增量加栽方法进行交通量的重分配。通过建立虚拟路网,类比分析单向交通组织优化前后的路网阻抗及出行时间,验证单向交通组织的优化效果。

  12. 台湾地区经济增长和能源消费的单方向因果关系%One-Way Causal Relationships between Economic Growth and Energy Consumption in Taiwan

    Institute of Scientific and Technical Information of China (English)

    陈燕武; 吴承业

    2011-01-01

    应用多变量时间序列间的协整和单方向因果测度理论,探讨1954-2008年台湾地区GDP(国内生产总值)和能源消费之间的长期均衡关系和因果关系.基于误差修正模型及协整阶数的似然比检验,可以发现台湾地区GDP与能源消费,GDP与石油消费,GDP与电力消费之间都存在协整关系.单方向因果测度的Wald统计检验表明,GDP和能源消费相互影响,而GDP对石油消费及电力消费的影响只是单方向的.%In this paper we discuss the long-run balanced relationship and causal relationship between gross domestic product (GDP) and energy consumption in Taiwan during the period of 1954-2008 with theories of cointegration among multivariate series and one-way causation measurement. Based on the error-correction model and likelihood ratio test, we find that there is a co-integrated relationship between GDP and energy consumption, GDP and oil consumption, GDP and electricity consumption in Taiwan. The Wald test of the one-way causation measurement shows that there is a mutual effect between the GDP and energy consumption, whereas only one-way that the GDP influences oil and electricity consumption.

  13. 液控单向阀在锁紧回路中的控制特性研究%Study on Control Characteristics of Hydraulic Control One-way Valve in Locking Circuit

    Institute of Scientific and Technical Information of China (English)

    苏沛群; 邓志辉; 张西良

    2014-01-01

    Aiming at the different installation positions of hydraulic control one-way valve in hydraulic locking circuit,based on the analysis to the opening necessary conditions and the opening control pressure under different working conditions of hydraulic control one-way valve,the idea was put forward that opening pressure of hydraulic control one-way valve was maximum when the hydraulic oil went into the chamber without rod,backed to the chamber with rod and the hydraulic cylinder subjected to reversed load. The relation between control pressure and the load of the hydraulic cylinder,the relation between structure parameters M of hydraulic control valve, the speed ratioφof hydraulic cylinder and oil resistanceΔp were described. Speed ratioφof the hydraulic cylinder is bigger,the open-ing pressure is greater;the structure parameter M of the hydraulic control one-way valve is larger,the opening pressure is smaller.%针对液控单向阀在液压锁紧回路中的不同安装位置,在分析不同工况下液控单向阀开启的必要条件和开启工作时的控制压力的基础上,提出液压缸无杆腔进油、有杆腔回油且液压缸承受反向负载时液控单向阀开启压力最大的理念,阐述了控制压力与液压缸的负载、液控单向阀的结构参数M、液压缸的速比φ和回油阻力Δp的关系,从而得出液压缸的速比φ越大、开启压力越大,液控单向阀的结构参数M越大、开启压力越小的结论。

  14. A Biomechanical Study of Hyoid Bone and Laryngeal Movements During Swallowing Comparing the Blom Low Profile Voice Inner Cannula and Passy-Muir One Way Tracheotomy Tube Speaking Valves.

    Science.gov (United States)

    Srinet, Prateek; Van Daele, Douglas J; Adam, Stewart I; Burrell, Morton I; Aronberg, Ryan; Leder, Steven B

    2015-12-01

    The aim of this prospective, consecutive, cohort study was to investigate the biomechanical effects, if any, of the Blom low profile voice inner cannula and Passy-Muir one-way tracheotomy tube speaking valves on movement of the hyoid bone and larynx during swallowing. Ten adult patients (8 male, 2 female) with an age range of 61-89 years (mean 71 years) participated. Criteria for inclusion were ≥18 years of age, English speaking, and ability to tolerate both changing to a Blom tracheotomy tube and placement of a one-way tracheotomy tube speaking valve with a fully deflated tracheotomy tube cuff. Digitized videofluoroscopic swallow studies were performed at 30 frames/s and with each patient seated upright in the lateral plane. A total of 18 swallows (three each with 5 cc bolus volumes of single contrast barium and puree + barium × 3 conditions) were analyzed for each participant. Variables evaluated included larynx-to-hyoid bone excursion (mm), maximum hyoid bone displacement (mm), and aspiration status under three randomized conditions: 1. Tracheotomy tube open with no inner cannula; 2. Tracheotomy tube with Blom valve; and 3. Tracheotomy tube with Passy-Muir valve. Blinded reliability testing with a Pearson product moment correlation was performed on 20 % of the data. Intra- and inter-rater reliability for combined measurements of larynx-to-hyoid bone excursion and maximum hyoid bone displacement was r = 0.98. Intra- and inter-rater reliability for aspiration status was 100 %. No significant differences (p > 0.05) were found for larynx-to-hyoid bone excursion and maximum hyoid bone displacement during swallowing based upon an open tracheotomy tube, Blom valve, or Passy-Muir valve. Aspiration status was identical for all three randomized conditions. The presence of a one-way tracheotomy tube speaking valve did not significantly alter two important components of normal pharyngeal swallow biomechanics, i.e., hyoid bone and laryngeal movements

  15. Rotational vibration modeling and optimization design of serpentine belt accessory drive system with one-way clutch%具有单向离合器的多楔带附件驱动系统旋转振动建模及参数优化设计

    Institute of Scientific and Technical Information of China (English)

    张少飞; 上官文斌; 曾祥坤

    2012-01-01

    A mathematical model for nonlinear rotational vibration analysis of a three pulley-serpentine belt accessory drive system (SBADs) with a one-way clutch was established. Gear's method was used to calculate the angle fluctuations of driven pulleys and tensioner arm. Calculation results show that, the dynamic indices of the SBADs, including angle fluctuations of driven pulleys and tensioner arm, tension of each belt span, and slip rate between belt and pulley decrease significantly as compared with those in the case of without the one-way clutch. Then, the dynamic properties of the SBADs were investigated under different spring stiffness of the one-way clutch, and different inertia ratio of the accessory shaft and driven pulley. Moreover, an optimization design model with the spring stiffness of the one-way clutch, and the inertia of the accessory shaft as two optimizing variables was established. In the optimization model, the minima of the angle fluctuation of tensioner arm, the spring torque of one-way clutch, and the slip ratio between belt and driven pulley were taken as objective functions. The optimization results were obtained by using fminimax function in the mat lab software. The analytical results show that the dynamic responses of the SBADs decrease significantly when using the optimization parameters. The methods of modeling, calculation and optimization design are instructive for the vibration control of an engine front end accessory drive (FEAD) system with one-way clutch.%建立有单向离合器装置的三轮-多楔带附件驱动系统的非线性旋转振动数学模型.用Gear数值算法求解从动轮与张紧臂的角度波动.计算结果表明,有单向离合器装置时从动轮与张紧臂的角度波动、各带段的动态张力、带-轮间的滑移率等系统动态特性均明显减小.计算、研究单向离合器弹簧刚度的大小、附件轴与从动轮转动惯量比的大小对系统动态特性的影响.以张

  16. Design of cross-linked semicrystalline poly(ε-caprolactone)-based networks with one-way and two-way shape-memory properties through Diels-Alder reactions.

    Science.gov (United States)

    Raquez, Jean-Marie; Vanderstappen, Sophie; Meyer, Franck; Verge, Pierre; Alexandre, Michael; Thomassin, Jean-Michel; Jérôme, Christine; Dubois, Philippe

    2011-08-29

    Cross-linked poly(ε-caprolactone) (PCL)-based polyesterurethane (PUR) systems have been synthesized through Diels-Alder reactions by reactive extrusion. The Diels-Alder and retro-Diels-Alder reactions proved to be useful for enhancing the molecular motion of PCL-based systems, and therefore their crystallization ability, in the design of cross-linked semicrystalline polymers with one-way and two-way shape-memory properties. Successive reactions between α,ω-diol PCL (PCL(2) ), furfuryl alcohol, and methylene diphenyl 4,4'-diisocyanate straightforwardly afforded the α,ω-furfuryl PCL-based PUR systems, and subsequent Diels-Alder reactions with N,N-phenylenedimaleimide afforded the thermoreversible cycloadducts. The cross-linking density could be modulated by partially replacing PCL-diol with PCL-tetraol. Interestingly, the resulting PUR systems proved to be semicrystalline cross-linked polymers, the melting temperature of which (close to 45 °C) represented the switching temperature for their shape-memory properties. Qualitative and quantitative measurements demonstrated that these PUR systems exhibited one-way and two-way shape-memory properties depending on their cross-linking density.

  17. Quantum key distribution with two-segment quantum repeaters

    Energy Technology Data Exchange (ETDEWEB)

    Kampermann, Hermann; Abruzzo, Silvestre; Bruss, Dagmar [Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2014-07-01

    Quantum repeaters represent one possible way to achieve long-distance quantum key distribution. One way of improving the repeater rate and decreasing the memory coherence time is the usage of multiplexing. Motivated by the experimental fact that long-range connections are practically demanding, we extend the analysis of the quantum repeater multiplexing protocol to the case of short-range connections. We derive formulas for the repeater rate and we show that short-range connections lead to most of the benefits of a full-range multiplexing protocol. A less demanding QKD-protocol without quantum memories was recently introduced by Lo et al. We generalize this measurement-device-independent quantum key Distribution protocol to the scenario where the repeater Station contains also heralded quantum memories. We assume either single-photon sources or weak coherent pulse sources plus decay states. We show that it is possible to significantly outperform the original proposal, even in presence of decoherence of the quantum memory. We give formulas in terms of device imperfections i.e., the quantum bit error rate and the repeater rate.

  18. Migratory timing, rate, routes and wintering areas of White-crested Elaenia (Elaenia albiceps chilensis), a key seed disperser for Patagonian forest regeneration

    OpenAIRE

    Bravo, Susana Patricia; Cueto, Victor Rodolfo; Gorosito, Cristian Andr?s

    2017-01-01

    Migratory animals often play key ecological roles within the communities they visit throughout their annual journeys. As a consequence of the links between biomes mediated by migrants, changes in one biome could affect remote areas in unpredictable ways. Migratory routes and timing of most Neotropical austral migrants, which breed at south temperate latitudes of South America and overwinter closer to or within tropical latitudes of South America, have yet to be described in detail. As a resul...

  19. A Novel Method For One-way Hash Function Construction Based on the Couple Map lattices%一种基于改进的CML的Hash函数算法

    Institute of Scientific and Technical Information of China (English)

    杨雪

    2011-01-01

    本文将标准的耦合映象格子模型进行一定改进,提出了一种基于改进的耦合映象格子的Hash函数构造算法。理论分析,仿真试验和对比分析表明此算法也具有很好的统计特性,抗碰撞性和灵活性。%Based on the couple map lattices (CML), a novel scheme for constructing Hash functions is proposed in this paper. Additionally, the algorithm has good statistical properties, excellent one-way, confusion and diffusion strong collision resistance.

  20. Seasonal variation in denitrification and dissimilatory nitrate reduction to ammonia process rates and corresponding key functional genes along an estuarine nitrate gradient

    Directory of Open Access Journals (Sweden)

    Cindy J Smith

    2015-06-01

    Full Text Available This research investigated spatial-temporal variation in benthic bacterial community structure, rates of denitrification and dissimilatory nitrate reduction to ammonium (DNRA processes and abundances of corresponding genes and transcripts at three sites – the estuary-head, mid-estuary and the estuary mouth along the nitrate gradient of the Colne estuary over an annual cycle. Denitrification rates declined down the estuary, while DNRA rates were higher at the estuary head and middle than the estuary mouth. In four out of the six two-monthly time-points, rates of DNRA were greater than denitrification at each site. Abundance of gene markers for nitrate-reduction (nitrate reductase narG and napA, denitrification (nitrite reductase nirS and DNRA (DNRA nitrite reductase nrfA declined along the estuary with significant relationships between denitrification and nirS abundance, and DNRA and nrfA abundance. Spatially, rates of denitrification, DNRA and corresponding functional gene abundances decreased along the estuary. However, temporal correlations between rate processes and functional gene and transcript abundances were not observed.

  1. Key Generation Using External Source Excitation: Capacity, Reliability, and Secrecy Exponent

    CERN Document Server

    Chou, Tzu-Han; Sayeed, Akbar M

    2011-01-01

    We study the fundamental limits to secret key generation from an excited distributed source (EDS). In an EDS a pair of terminals observe dependent sources of randomness excited by a pre-arranged signal. We first determine the secret key capacity for such systems with one-way public messaging. We then characterize a tradeoff between the secret key rate and exponential bounds on the probability of key agreement failure and on the secrecy of the key generated. We find that there is a fundamental tradeoff between reliability and secrecy. We then explore this framework within the context of reciprocal wireless channels. In this setting, the users transmit pre-arranged excitation signals to each other. When the fading is Rayleigh, the observations of the users are jointly Gaussian sources. We show that an on-off excitation signal with an SNR-dependent duty cycle achieves the secret key capacity of this system. Furthermore, we characterize a fundamental metric -- minimum energy per key bit for reliable key generatio...

  2. 垂直轴水轮机单向流固耦合数值研究%One way fluid and structure interaction numerical analysis of vertical axis tidal turbine

    Institute of Scientific and Technical Information of China (English)

    张亮; 何环宇; 张学伟; 马勇

    2014-01-01

    As for vertical axis turbine fluid-structure interaction problems ,using one-way FSI meth-od ,combined with uniform force and interpolation method ,the stress distribution of the blade ,the stress distribution ,displacement and the deformation of VAWT (vertical axis water turbine) were an-alyzed .The most danger state of the VAWT when it is rotating and the changing law with TSR (tip-speed ratio) were given .The results show that under a certain TSR ,azimuth angle is the most dan-gerous working condition when the impeller by the resultant force is the largest .The most dangerous azimuth increases as the TSR ,and gradually approaching the place where the blade chord line and the velocity direction is perpendicular ,that is 90° .The uniform force and interpolation method are used to analyze one-way FSI (fluid-solid interaction) of blades ,which can get the same change law ,and uni-form force method tends to be more conservative .%针对垂直轴水轮机流固耦合问题,采用均布力法和插值法相结合的单向流固耦合方法,在不同速比的工况下,分析叶片应力、水轮机整体应力、位移以及应变的变化规律,得出垂直轴水轮机在旋转过程中最危险工作方位角及其随速比变化的规律。结果表明:在一定速比下,当水轮机转到某一方位角时,叶轮受合力最大,此方位角为最危险工况;最危险方位角随着速比增大而增大,并逐渐接近叶片弦线与来流速度方向垂直的位置即90°;基于均布力法和插值法对水轮机叶片进行单向流固耦合分析,可以得到相同变化规律,在数值上均布力法更趋于保守。

  3. Privacy protection revocation mechanism based on universal one-way accumulator in VANET%基于通用单向累加器的车载自组织网络隐私保护撤销机制

    Institute of Scientific and Technical Information of China (English)

    蔡鹏飞; 王崇科; 李晓平

    2016-01-01

    针对车载自组织网络(vehicular Ad hoc network,VANET)中撤销异常行为车辆可能导致敏感信息泄露的问题,提出了一种基于通用单向累加器的隐私保护撤销机制(privacy protection revocation mechanism based on one-way accumulator,OWA-PPRM)。首先,将所有撤销信息累加到一个值并将其传播给网络中的所有实体节点;然后,车辆与没有泄露个人信息的公共道路路边系统(road-side units,RSU)进行通信来更新证书;最后,利用移动存储库从 RSU 下载和更新单向累加器的副本以及目击证人的必要信息。仿真结果表明,OWA-PPRM显著降低了认证管理计算复杂度,大大提高了认证效率,同时保护了用户的隐私。%To solve the problem of leaking sensitive information in VANET while the revocation misbehaving vehicles,this pa-per proposed a OWA-PPRM.Firstly,it accumulated all of the revocation informations to a single value that was transmitted to all the entities in the network.Then,the vehicles contacted RSU without leaking personal information to obtain and update the certificate.Finally,it downloaded and updated the copy of one-way accumulator and the auxiliary information necessary of the witness from RSU using mobile repository.Simulation results show that the OWA-PPRMsignificantly reduces the complexity of certificate management,and it achieves great efficiency and scalability while preserving the users’privacy.

  4. How do Supervising Clinicians of a University Hospital and Associated Teaching Hospitals Rate the Relevance of the Key Competencies within the CanMEDS Roles Framework in Respect to Teaching in Clinical Clerkships?

    Directory of Open Access Journals (Sweden)

    Jilg, Stefanie

    2015-08-01

    Full Text Available Background and aim: In German-speaking countries, the physicians’ roles framework of the “Canadian Medical Education Directives for Specialists” (CanMEDS is increasingly used to conceptualize postgraduate medical education. It is however unclear, whether it may also be applied to the final year of undergraduate education within clinical clerkships, called “Practical Year” (PY.Therefore, the aim of this study was to explore how clinically active physicians at a university hospital and at associated teaching hospitals judge the relevance of the seven CanMEDS roles (and their (role-defining key competencies in respect to their clinical work and as learning content for PY training. Furthermore, these physicians were asked whether the key competencies were actually taught during PY training. Methods: 124 physicians from internal medicine and surgery rated the relevance of the 28 key competencies of the CanMEDS framework using a questionnaire. For each competency, following three aspects were rated: “relevance for your personal daily work”, “importance for teaching during PY”, and “implementation into actual PY teaching”.Results: In respect to the main study objective, all questionnaires could be included into analysis. All seven CanMEDS roles were rated as relevant for personal daily work, and also as important for teaching during PY. Furthermore, all roles were stated to be taught during actual PY training.The roles “Communicator”, “Medical Expert”, and “Collaborator” were rated as significantly more important than the other roles, for all three sub-questions. No differences were found between the two disciplines internal medicine and surgery, nor between the university hospital and associated teaching hospitals.Conclusion: Participating physicians rated all key competencies of the CanMEDS model to be relevant for their personal daily work, and for teaching during PY. These findings support the suitability of the

  5. Depth keying

    Science.gov (United States)

    Gvili, Ronen; Kaplan, Amir; Ofek, Eyal; Yahav, Giora

    2003-05-01

    We present a new solution to the known problem of video keying in a natural environment. We segment foreground objects from background objects using their relative distance from the camera, which makes it possible to do away with the use of color for keying. To do so, we developed and built a novel depth video camera, capable of producing RGB and D signals, where D stands for the distance to each pixel. The new RGBD camera enables the creation of a whole new gallery of effects and applications such as multi-layer background substitutions. This new modality makes the production of real time mixed reality video possible, as well as post-production manipulation of recorded video. We address the problem of color spill -- in which the color of the foreground object is mixed, along its boundary, with the background color. This problem prevents an accurate separation of the foreground object from its background, and it is most visible when compositing the foreground objects to a new background. Most existing techniques are limited to the use of a constant background color. We offer a novel general approach to the problem with enabling the use of the natural background, based upon the D channel generated by the camera.

  6. Migratory timing, rate, routes and wintering areas of White-crested Elaenia (Elaenia albiceps chilensis), a key seed disperser for Patagonian forest regeneration.

    Science.gov (United States)

    Bravo, Susana Patricia; Cueto, Victor Rodolfo; Gorosito, Cristian Andrés

    2017-01-01

    Migratory animals often play key ecological roles within the communities they visit throughout their annual journeys. As a consequence of the links between biomes mediated by migrants, changes in one biome could affect remote areas in unpredictable ways. Migratory routes and timing of most Neotropical austral migrants, which breed at south temperate latitudes of South America and overwinter closer to or within tropical latitudes of South America, have yet to be described in detail. As a result, our understanding about how these birds provide links between South American biomes is almost non-existent. White-crested Elaenia (Elaenia albiceps chilensis) is a long-distance austral migrant that breeds in the Patagonian Forest biome and overwinters in tropical South America. Because this small flycatcher plays a key role in the regeneration of this ecosystem, our objective was to describe the annual cycle of White-crested elaenias to evaluate the degree of migratory connectivity between breeding and wintering areas and therefore to determine if there are specific biomes of northern South America linked by elaenias to Patagonian forests. Fifteen individuals were successfully tracked throughout a complete migration cycle using miniature light-level geolocators. All individuals resided and moved through the same general regions. During fall (March-April-May), elaenias were located in the Caatinga and the Atlantic Forest biomes, from Rio de Janeiro to the region near Salvador da Bahia, Brazil. During winter (June-July-Aug.), birds were located further inland, within the Cerrado biome. Birds used three different routes during fall migration. Our results indicate that some individuals use a direct route, flying between 500-600 km/day, crossing desert and grasslands, while others took a detour, flying 100-200 km/day through forested areas with refueling opportunities. All birds used the Yunga forest during spring migration, with ten out of 15 individuals showing a clear

  7. Migratory timing, rate, routes and wintering areas of White-crested Elaenia (Elaenia albiceps chilensis), a key seed disperser for Patagonian forest regeneration

    Science.gov (United States)

    Bravo, Susana Patricia; Cueto, Victor Rodolfo; Gorosito, Cristian Andrés

    2017-01-01

    Migratory animals often play key ecological roles within the communities they visit throughout their annual journeys. As a consequence of the links between biomes mediated by migrants, changes in one biome could affect remote areas in unpredictable ways. Migratory routes and timing of most Neotropical austral migrants, which breed at south temperate latitudes of South America and overwinter closer to or within tropical latitudes of South America, have yet to be described in detail. As a result, our understanding about how these birds provide links between South American biomes is almost non-existent. White-crested Elaenia (Elaenia albiceps chilensis) is a long-distance austral migrant that breeds in the Patagonian Forest biome and overwinters in tropical South America. Because this small flycatcher plays a key role in the regeneration of this ecosystem, our objective was to describe the annual cycle of White-crested elaenias to evaluate the degree of migratory connectivity between breeding and wintering areas and therefore to determine if there are specific biomes of northern South America linked by elaenias to Patagonian forests. Fifteen individuals were successfully tracked throughout a complete migration cycle using miniature light-level geolocators. All individuals resided and moved through the same general regions. During fall (March-April-May), elaenias were located in the Caatinga and the Atlantic Forest biomes, from Rio de Janeiro to the region near Salvador da Bahia, Brazil. During winter (June-July-Aug.), birds were located further inland, within the Cerrado biome. Birds used three different routes during fall migration. Our results indicate that some individuals use a direct route, flying between 500–600 km/day, crossing desert and grasslands, while others took a detour, flying 100–200 km/day through forested areas with refueling opportunities. All birds used the Yunga forest during spring migration, with ten out of 15 individuals showing a clear

  8. Parallel Processing of Syntax Parsing Algorithm for UPD Grammar Based on One-way Cell Automata%基于单向点格自动机的UPG文法识别并行算法

    Institute of Scientific and Technical Information of China (English)

    李玉萍

    2016-01-01

    UPG文法是一种特殊的生成文法,在分析的过程中可以没有回溯。该文法能够更好地描述自然语言中特殊的语法结构。单向点格自动机是进行语言并行识别的模型。通过对该文法和点格自动机深入的分析,提出了一种在并行环境下基于点格自动机的无回溯的语法分析和识别算法。文章通过实例详细描述了算法并行处理的过程,验证算法的正确性和可行性。%A uniquely parsable grammar(UPD)is a special kind of generative grammar where parsing can be performed without backtracking. UPD grammars have greater generative power than the context-free grammars. This family of grammars and one-way cell automata is deeply analyzed. A recognition and parsing algorithm under Paral-lel environment is presented. The process of parallel processing is described by instance and the validity of the algo-rithm is verified.

  9. 从单向传达到交互参与的设计思维转换%Design Thinking Transformation from One-way Convey to Interaction Involvement

    Institute of Scientific and Technical Information of China (English)

    吴汉怀; 周家乐

    2012-01-01

    以参与性设计为启示,分析了单向传达与交互参与2种设计的优缺点,论述了交互参与性设计的研究价值与意义,在此基础上,提出了交互参与性设计的设计思路使设计更好的满足消费需求,从而达到产消一体化的目的。%Enlightened by the interactive participate design,it analyzed the advantages and disadvantages of one-way convey and interaction involvement in design,discussed the research value and significance of interaction involvement in design.On this basis,it put forward the design ideas of interaction involvement in design,made the design better to meet consumer demand,so as to achieve the goal of integration of production and consumption.

  10. Assessing Occupational Exposure Via the Unbalanced One-Way Random Models%不平衡单因素随机模型在职业接触评价中的应用

    Institute of Scientific and Technical Information of China (English)

    李新民

    2009-01-01

    A unbalanced one-way random model is considered for assessing the proportion of workers whose mean exposure exceed the occupational exposure limit (OEL) based on exposure measurements to the worker. Hypothesis testing for the relevant parameter of interest is proposed when the exposure data are unbalanced. The method is based on the generalize inference. A simulation study is conducted to compare it with that of Krishnamoorthy and Guo (2005). Simulation results suggest that the proposed method appears to be better, especially in very unbalanced design.%在职业接触评价中,单因素随机模型可用于评价工人接触均值超过职业接触限值的概率.当数据不平衡时,本文利用广义推断研究了关于此概率的假设检验,并对此方法与已有方法进行了模拟对比研究.模拟结果表明,本文所给方法优于已有方法,特别是在数据极不平衡时效果更优.

  11. Keys through ARQ

    CERN Document Server

    Latif, Mohamed Abdel; Gamal, Hesham El

    2009-01-01

    This paper develops a novel framework for sharing secret keys using the well-known Automatic Repeat reQuest (ARQ) protocol. The proposed key sharing protocol does not assume any prior knowledge about the channel state information (CSI), but, harnesses the available opportunistic secrecy gains using only the one bit feedback, in the form of ACK/NACK. The distribution of key bits among multiple ARQ epochs, in our approach, allows for mitigating the secrecy outage phenomenon observed in earlier works. We characterize the information theoretic limits of the proposed scheme, under different assumptions on the channel spatial and temporal correlation function, and develop low complexity explicit implementations. Our analysis reveals a novel role of "dumb antennas" in overcoming the negative impact of spatial correlation, between the legitimate and eavesdropper channels, on the achievable secrecy rates. We further develop an adaptive rate allocation policy which achieves higher secrecy rates by exploiting the channe...

  12. Measurement of key resonance states for the P30(p,γS31 reaction rate, and the production of intermediate-mass elements in nova explosions

    Directory of Open Access Journals (Sweden)

    A. Kankainen

    2017-06-01

    Full Text Available We report the first experimental constraints on spectroscopic factors and strengths of key resonances in the P30(p,γS31 reaction critical for determining the production of intermediate-mass elements up to Ca in nova ejecta. The P30(d,nS31 reaction was studied in inverse kinematics using the GRETINA γ-ray array to measure the angle-integrated cross-sections of states above the proton threshold. In general, negative-parity states are found to be most strongly produced but the absolute values of spectroscopic factors are typically an order of magnitude lower than predicted by the shell-model calculations employing WBP Hamiltonian for the negative-parity states. The results clearly indicate the dominance of a single 3/2− resonance state at 196 keV in the region of nova burning T≈0.10–0.17 GK, well within the region of interest for nova nucleosynthesis. Hydrodynamic simulations of nova explosions have been performed to demonstrate the effect on the composition of nova ejecta.

  13. Measurement of key resonance states for the 30P (p , γ)31S reaction rate, and the production of intermediate-mass elements in nova explosions

    Science.gov (United States)

    Kankainen, A.; Woods, P. J.; Schatz, H.; Poxon-Pearson, T.; Doherty, D. T.; Bader, V.; Baugher, T.; Bazin, D.; Brown, B. A.; Browne, J.; Estrade, A.; Gade, A.; José, J.; Kontos, A.; Langer, C.; Lotay, G.; Meisel, Z.; Montes, F.; Noji, S.; Nunes, F.; Perdikakis, G.; Pereira, J.; Recchia, F.; Redpath, T.; Stroberg, R.; Scott, M.; Seweryniak, D.; Stevens, J.; Weisshaar, D.; Wimmer, K.; Zegers, R.

    2017-06-01

    We report the first experimental constraints on spectroscopic factors and strengths of key resonances in the 30P (p , γ)31S reaction critical for determining the production of intermediate-mass elements up to Ca in nova ejecta. The 30P (d , n)31S reaction was studied in inverse kinematics using the GRETINA γ-ray array to measure the angle-integrated cross-sections of states above the proton threshold. In general, negative-parity states are found to be most strongly produced but the absolute values of spectroscopic factors are typically an order of magnitude lower than predicted by the shell-model calculations employing WBP Hamiltonian for the negative-parity states. The results clearly indicate the dominance of a single 3 /2- resonance state at 196 keV in the region of nova burning T ≈ 0.10- 0.17 GK, well within the region of interest for nova nucleosynthesis. Hydrodynamic simulations of nova explosions have been performed to demonstrate the effect on the composition of nova ejecta.

  14. Measurement of key resonance states for the P-30(p, gamma)S-31 reaction rate, and the production of intermediate -mass elements in nova explosions

    Energy Technology Data Exchange (ETDEWEB)

    Kankainen, A.; Woods, P. J.; Schatz, H.; Poxon-Pearson, T.; Doherty, D. T.; Bader, V.; Baugher, T.; Bazin, D.; Brown, B. A.; Browne, J.; Seweryniak, D.

    2017-06-10

    We report the first experimental constraints on spectroscopic factors and strengths of key resonances in the P-30(p, gamma)S-31 reaction critical for determining the production of intermediate-mass elements up to Ca in nova ejecta. The P-30(d,n)S-31 reaction was studied in inverse kinematics using the GRETINA gamma-ray array to measure the angle-integrated cross-sections of states above the proton threshold. In general, negative parity states are found to be most strongly produced but the absolute values of spectroscopic factors are typically an order of magnitude lower than predicted by the shell-model calculations employing WBP Hamiltonian for the negative-parity states. The results clearly indicate the dominance of a single 3/2(-) resonance state at 196 keV in the region of nova burning T approximate to 0.10-0.17 GM, well within the region of interest for nova nucleosynthesis. Hydrodynamic simulations of nova explosions have been performed to demonstrate the effect on the composition of nova ejecta.

  15. The physical underpinning of security proofs for quantum key distribution

    Science.gov (United States)

    Boileau, Jean Christian

    The dawn of quantum technology unveils a plethora of new possibilities and challenges in the world of information technology, one of which is the quest for secure information transmission. A breakthrough in classical algorithm or the development of a quantum computer could threaten the security of messages encoded using public key cryptosystems based on one-way function such as RSA. Quantum key distribution (QKD) offers an unconditionally secure alternative to such schemes, even in the advent of a quantum computer, as it does not rely on mathematical or technological assumptions, but rather on the universality of the laws of quantum mechanics. Physical concepts associated with quantum mechanics, like the uncertainty principle or entanglement, paved the way to the first successful security proof for QKD. Ever since, further development in security proofs for QKD has been remarkable. But the connection between entanglement distillation and the uncertainty principle has remained hidden under a pile of mathematical burden. Our main goal is to dig the physics out of the new advances in security proofs for QKD. By introducing an alternative definition of private state, which elaborates the ideas of Mayers and Koashi, we explain how the security of all QKD protocols follows from an entropic uncertainty principle. We show explicitly how privacy amplification protocol can be reduced to a private state distillation protocol constructed from our observations about the uncertainty principle. We also derive a generic security proof for one-way permutation-invariant QKD protocols. Considering collective attack, we achieve the same secret key generation rate as the Devetak-Winter's bound. Generalizing an observation from Kraus, Branciard and Renner, we have provided an improved version of the secret key generation rates by considering a different symmetrization. In certain situations, we argue that Azuma's inequality can simplify the security proof considerably, and we explain

  16. Changes in Activities of the Key Enzymes Related to Starch Synthesis in Rice Grains During Grain Filling and Their Relationships with the Filling Rate and Cooking Quality

    Institute of Scientific and Technical Information of China (English)

    ZHAO Bu-hong; ZHANG Wen-jie; WANG Zhi-qin; ZHU Qin-sen; YANG Jian-chang

    2005-01-01

    With 10 rice cultivars (lines) as materials, the changes in activities of adenosine diphosphoglucose pyrophosphorylase (ADPGPase), starch synthase (SSase) and starch branching enzyme (Q-enzyme) in the grains during grain filling, and their relationships with the filling rate, gel consistency (GC), alkali spreading value (ASV) and amylose content (AC) were studied. The results showed that changes in activities of ADPGPase, SSase and Q-enzyme exhibited a single peak during grain filling, and the time of the activity peaks for the former two enzymes was earlier than that of the maximum grain-filling rate (Tmax), and the time reaching the peak for Q-enzyme was synchronous with Tmax. The activities at early grain filling stage, and the mean and maximum activities of each enzyme during grain filling period were positively and significantly or very significantly correlated with the mean and maximum grain filling rate and starch content (mg grain-1) in the grains.Activities of ADPGPase at all grain filling stages and those of Q-enzyme at the early and mid filling stages were not significantly correlated the cooking quality (GC, ASV and AC). SSase activities at the early filling stage were significantly and negatively correlated with GC and ASV, and positively correlated with AC. Activities of SSase at mid and late grain filling stages and Q-enzyme at the late filling stage were significantly and positively correlated with GC and ASV, and negatively correlated with AC. Spraying zeatin or abscisic acid at early grain filling stage could obviously regulate the activities of ADPGPase, SSase and Q-enzyme in the grains.

  17. Identifying key climate and environmental factors affecting rates of post-fire big sagebrush (Artemisia tridentata) recovery in the northern Columbia Basin, USA

    Science.gov (United States)

    Shinneman, Douglas; McIlroy, Susan

    2016-01-01

    Sagebrush steppe of North America is considered highly imperilled, in part owing to increased fire frequency. Sagebrush ecosystems support numerous species, and it is important to understand those factors that affect rates of post-fire sagebrush recovery. We explored recovery of Wyoming big sagebrush (Artemisia tridentata ssp.wyomingensis) and basin big sagebrush (A. tridentata ssp. tridentata) communities following fire in the northern Columbia Basin (Washington, USA). We sampled plots across 16 fires that burned in big sagebrush communities from 5 to 28 years ago, and also sampled nearby unburned locations. Mixed-effects models demonstrated that density of large–mature big sagebrush plants and percentage cover of big sagebrush were higher with time since fire and in plots with more precipitation during the winter immediately following fire, but were lower when precipitation the next winter was higher than average, especially on soils with higher available water supply, and with greater post-fire mortality of mature big sagebrush plants. Bunchgrass cover 5 to 28 years after fire was predicted to be lower with higher cover of both shrubs and non-native herbaceous species, and only slightly higher with time. Post-fire recovery of big sagebrush in the northern Columbia Basin is a slow process that may require several decades on average, but faster recovery rates may occur under specific site and climate conditions.

  18. NaCl and TDZ are Two Key Factors for the Improvement of In Vitro Regeneration Rate of Salicornia europaea L.

    Institute of Scientific and Technical Information of China (English)

    Xiu-Ling Shi; He-Ping Han; Wu-Liang Shi; Yin-Xin Li

    2006-01-01

    The present study aimed to find out suitable conditions for the in vitro culture of Salicornla europaea L.and to develop an efficient regeneration system. S. europaea plants were regenerated successfully in vitro from callus derived from mature embryos. Via the method of 2,4-dichlorophenoxyacetic acid (2,4-D)short-treatment on mature seeds, callus was induced from hypocotyls on the MS medium with 4.55μmol/L N-phenyl-N'-1, 2, 3-thiadiazol-5-yl urea (TDZ) 3-4 weeks after the seeds germinated. The callus differentiated into shoots at a rate of 27.6% after subculture for one time on the same medium. When NaCl was included in the medium, shoots were formed in cluster and the shoot differentiation frequency was increased to 55.2%. The shoots were rooted when cultured on 1/2 MS medium supplemented with indole3-butyric acid (IBA), klnetin (KN) and activated charcoal (AC). The results indicated that NaCl and TDZ played an important role in the improvement of the regeneration rate of the halophyte, S. europaea.

  19. Sarcolipin Is a Key Determinant of the Basal Metabolic Rate, and Its Overexpression Enhances Energy Expenditure and Resistance against Diet-induced Obesity.

    Science.gov (United States)

    Maurya, Santosh K; Bal, Naresh C; Sopariwala, Danesh H; Pant, Meghna; Rowland, Leslie A; Shaikh, Sana A; Periasamy, Muthu

    2015-04-24

    Sarcolipin (SLN) is a novel regulator of sarcoplasmic reticulum Ca(2+) ATPase (SERCA) in muscle. SLN binding to SERCA uncouples Ca(2+) transport from ATP hydrolysis. By this mechanism, SLN promotes the futile cycling of SERCA, contributing to muscle heat production. We recently showed that SLN plays an important role in cold- and diet-induced thermogenesis. However, the detailed mechanism of how SLN regulates muscle metabolism remains unclear. In this study, we used both SLN knockout (Sln(-/-)) and skeletal muscle-specific SLN overexpression (Sln(OE)) mice to explore energy metabolism by pair feeding (fixed calories) and high-fat diet feeding (ad libitum). Our results show that, upon pair feeding, Sln(OE) mice lost weight compared with the WT, but Sln(-/-) mice gained weight. Interestingly, when fed with a high-fat diet, Sln(OE) mice consumed more calories but gained less weight and maintained a normal metabolic profile in comparison with WT and Sln(-/-) mice. We found that oxygen consumption and fatty acid oxidation were increased markedly in Sln(OE) mice. There was also an increase in both mitochondrial number and size in Sln(OE) muscle, together with increased expression of peroxisome proliferator-activated receptor δ (PPARδ) and PPAR γ coactivator 1 α (PGC1α), key transcriptional activators of mitochondrial biogenesis and enzymes involved in oxidative metabolism. These results, taken together, establish an important role for SLN in muscle metabolism and energy expenditure. On the basis of these data we propose that SLN is a novel target for enhancing whole-body energy expenditure.

  20. The Pricing Model of Closed-loop Supply Chain with Capacity Constraint under One-way Substitution Strategy%有限产能下单向替代的闭环供应链定价模型研究

    Institute of Scientific and Technical Information of China (English)

    梁云; 雷红; 左小德

    2013-01-01

    本文分析存在产品替代策略的情况下,闲环供应链在有限产能及废旧物品回收数量有限条件下的最优定价策略,分别得出四种不同情形下的最优定价策略与利润情况.同时,分析产能限制及废旧物品回收数量限制两个条件对最优定价决策与利润水平的影响,并通过数值试验进行验证.%This paper adopts product substitution strategy to analyze the optimal pricing strategies of closed-loop supply chains with capacity and used product collecting volume constraints. The optimal pricing schemes and profit levels are also calculated under four circumstances. Moreover, this paper discusses the influence of the above two constraints on optimal pricing strategies. Finally, numerical experiments are adopted to test the theoretical analysis. There are two kinds of products in a remanufacturing closed-loop supply chain: new product and remanufactured product. Although both products have similar functions, customers have higher quality perception for new products than re-manufactured products because of production cost and durability factors. Sometimes, a manufacturer needs to provide customers with new products for the price of remanufactured products because the latter products are out of stock. In general, customers are receptive to the substitution effect. Capacity constraint of the manufactureralso plays an important role in the pricing strategy for a supply chain because new products and remanufactured products consume same labor, machine hours and other resources. When a manufacturer's capacity cannot satisfy all demands of both products, the capacity allocation decision becomes important because it can affect profit of supply chain members. With the assumptions of one way substitution and capacity strategy, mathematical models are set up to explore pricing strategies in the closed-loop supply chain. This study also considers the relationship between new product ' s sales amount and

  1. The emotional importance of key: do Beatles songs written in different keys convey different emotional tones?

    Science.gov (United States)

    Whissel, R; Whissel, C

    2000-12-01

    Lyrics from 155 songs written by the Lennon-McCartney team were scored using the Dictionary of Affect in Language. Resultant scores (pleasantness, activation, and imagery of words) were compared across key signatures using one way analyses of variance. Words from songs written in minor keys were less pleasant and less active than those from songs written in major keys. Words from songs written in the key of F scored extremely low on all three measures. Lyrics from the keys of C, D, and G were relatively active in tone. Results from Dictionary scoring were compared with assignments of character to keys made more than one century ago and with current musicians' opinions.

  2. Experimentally feasible quantum-key-distribution scheme using qubit-like qudits and its comparison with existing qubit- and qudit-based protocols

    Science.gov (United States)

    Chau, H. F.; Wang, Qinan; Wong, Cardythy

    2017-02-01

    Recently, Chau [Phys. Rev. A 92, 062324 (2015), 10.1103/PhysRevA.92.062324] introduced an experimentally feasible qudit-based quantum-key-distribution (QKD) scheme. In that scheme, one bit of information is phase encoded in the prepared state in a 2n-dimensional Hilbert space in the form (|i > ±|j >) /√{2 } with n ≥2 . For each qudit prepared and measured in the same two-dimensional Hilbert subspace, one bit of raw secret key is obtained in the absence of transmission error. Here we show that by modifying the basis announcement procedure, the same experimental setup can generate n bits of raw key for each qudit prepared and measured in the same basis in the noiseless situation. The reason is that in addition to the phase information, each qudit also carries information on the Hilbert subspace used. The additional (n -1 ) bits of raw key comes from a clever utilization of this extra piece of information. We prove the unconditional security of this modified protocol and compare its performance with other existing provably secure qubit- and qudit-based protocols on market in the one-way classical communication setting. Interestingly, we find that for the case of n =2 , the secret key rate of this modified protocol using nondegenerate random quantum code to perform one-way entanglement distillation is equal to that of the six-state scheme.

  3. Research on the phase-noise-induced error in dual one-way ranging%相位噪声引起的双向单程测距误差研究

    Institute of Scientific and Technical Information of China (English)

    陈莉; 王跃科; 张传胜

    2013-01-01

    为了研究时钟相位噪声引起的DOWR测距误差的特性,通过建立时标偏差与相位噪声耦合效应对测距误差的影响模型,得出了测距误差与相位噪声间的频域传递函数和定量关系.以使用时钟OCXO8607的DOWR系统为例,对测距误差进行了功率谱分析和误差水平估计,结果表明导致测距误差的并不是单颗卫星的时标偏差,而是两颗卫星时标偏差之间的差异,并且测距误差与双星时标偏差的差异之间存在近似线性的关系,在使用OCXO8607条件下0.1s的时标偏差差异将导致约500 μm的测距误差,并基于时域的仿真验证了频域分析的结果.%In order to study the characteristics of the clock phase-noise-induced ranging error in dual one-way ranging (DOWR), a model of the coupling effect of time-tag offset and phase noise on the ranging error was built, accordingly a frequency-domain transfer function and a quantitative relationship between ranging error and phase noise were derived. Power spectral analysis and level assessment of the ranging error, which were performed based on a DOWR system adopting OCXO8607, show that it is the discrepancy of the two satellites' time-tag offsets, rather than the individual time-tag offset causes the ranging error, and there is a nearly linear relationship between the ranging error and the discrepancy of the time-tag offsets, and a discrepancy of 0.1 s will induce a ranging error of about 500μm with the DOWR system using OCXO8607. The time-domain simulation verified the frequency-domain results.

  4. Applications of single-qubit rotations in quantum public-key cryptography

    Science.gov (United States)

    Nikolopoulos, Georgios M.

    2008-03-01

    We discuss cryptographic applications of single-qubit rotations from the perspective of trapdoor one-way functions and public-key encryption. In particular, we present an asymmetric cryptosystem whose security relies on fundamental principles of quantum physics. A quantum public key is used for the encryption of messages while decryption is possible by means of a classical private key only. The trapdoor one-way function underlying the proposed cryptosystem maps integer numbers to quantum states of a qubit and its inversion can be infeasible by virtue of the Holevo’s theorem.

  5. Analysis and Simulation of Quantum Bit Rate in Satellite Based Quantum Key System%星地量子密钥系统中量子比特率分析与仿真

    Institute of Scientific and Technical Information of China (English)

    赵安廷; 赵黎平

    2011-01-01

    量子比特率是衡量一个量子密钥系统性能优劣的重要参数之一.通过研究星-地量子密钥分配系统中量子链路的持续时间,分析了量子链路持续时间内地面站天线俯仰角的变化情况,在此基础上建立了LEO星-地单光子下行链路的星-地量子比特率模型.仿真结果表明,LEO星-地单光子下行链路的星地量子比特率在每次链路的中心时刻达到极大值.星-地量子比特率能够达到实用的要求,进一步验证了星-地量子密钥分配的可行性.%Quantum bit rate is an important parameter in quantum key distribution system. Quantum link during time in a satellite-to-ground quantum key distribution system was studied, and the variation of pitch angle at facility was analyzed. Then the link model between low earth orbit and earth station was built. By numerical analyzing, it is shown that, quantum bit rate varies with the satellite's movement and in the centre of link, the quantum bit rate reaches the maximal value. The results show that quantum bit rate in an earth-based station and low earth orbit satellite QKD system can reach the practical demand and is feasible.

  6. GENERALIZED MATRIXES OF GALOIS PROTOCOLS EXCHANGE ENCRYPTION KEYS

    Directory of Open Access Journals (Sweden)

    Anatoly Beletsky

    2016-03-01

    Full Text Available The methods of construction of matrix formation the secret protocols legalized subscribers of public communications networks encryption keys. Based key exchange protocols laid asymmetric cryptography algorithms. The solution involves the calculation of one-way functions and is based on the use of generalized Galois arrays of isomorphism relationship with forming elements, and depending on the selected irreducible polynomial generating matrix. A simple method for constructing generalized Galois matrix by the method of filling the diagonal. In order to eliminate the isomorphism of Galois arrays and their constituent elements, limiting the possibility of building one-way functions, Galois matrix subjected to similarity transformation carried out by means of permutation matrices. The variant of the organization of the algebraic attacks on encryption keys sharing protocols and discusses options for easing the consequences of an attack.

  7. Multi-Seed Key Distribution Scheme Test

    Institute of Scientific and Technical Information of China (English)

    XIE Yumin; SHI Feng; MING Yang; Muhammad Kamran; YANG Xiaoxu

    2006-01-01

    The key problem of securing multicast is to generate, distribute and update Session Encryption Key(SEK). Polynomial expansion with multi-seed(MPE) scheme is an approach which is based on Polynomial expansion(PE) scheme and overcomes PE's shortage. Its operation is demonstrated by using multi-seed, the group member is partitioned to many subgroups. While updating the SEK, computation is needed only in one of subgroups, the other of them will use the computation history to update their SEK. The key problems to design a MPE scheme application includes to find a feasible one way function as well as to generate a Strict Prime Number(SPN). Those technologies with multi-seed and computation history concepts make MPE as a good choice in practical applications. A prototype test system is designed and solutions of all above mentioned problems are included in this proposed paper.

  8. Efficient Quantum Key Distribution

    CERN Document Server

    Ardehali, M; Chau, H F; Lo, H K

    1998-01-01

    We devise a simple modification that essentially doubles the efficiency of a well-known quantum key distribution scheme proposed by Bennett and Brassard (BB84). Our scheme assigns significantly different probabilities for the different polarization bases during both transmission and reception to reduce the fraction of discarded data. The actual probabilities used in the scheme are announced in public. As the number of transmitted signals increases, the efficiency of our scheme can be made to approach 100%. The security of our scheme (against single-photon eavesdropping strategies) is guaranteed by a refined analysis of accepted data which is employed to detect eavesdropping: Instead of lumping all the accepted data together to estimate a single error rate, we separate the accepted data into various subsets according to the basis employed and estimate an error rate for each subset individually. Our scheme is the first quantum key distribution with an efficiency greater than 50%. We remark that our idea is rath...

  9. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Study on Optimization of Enzymic Preparation of Collagen Polypeptide from Skin of Gadous macrocephaius Liu Chun-e et al. (1) Abstract Enzymolysis was used to prepare collagen peptide. The optimum condition was determined based on one way ANOVA and orthogonal experimental design. The result indicated that use alkaline protease on the concentration of 4.5%,

  10. Limitations on quantum key repeaters.

    Science.gov (United States)

    Bäuml, Stefan; Christandl, Matthias; Horodecki, Karol; Winter, Andreas

    2015-04-23

    A major application of quantum communication is the distribution of entangled particles for use in quantum key distribution. Owing to noise in the communication line, quantum key distribution is, in practice, limited to a distance of a few hundred kilometres, and can only be extended to longer distances by use of a quantum repeater, a device that performs entanglement distillation and quantum teleportation. The existence of noisy entangled states that are undistillable but nevertheless useful for quantum key distribution raises the question of the feasibility of a quantum key repeater, which would work beyond the limits of entanglement distillation, hence possibly tolerating higher noise levels than existing protocols. Here we exhibit fundamental limits on such a device in the form of bounds on the rate at which it may extract secure key. As a consequence, we give examples of states suitable for quantum key distribution but unsuitable for the most general quantum key repeater protocol.

  11. Key Statistics for Thyroid Cancer

    Science.gov (United States)

    ... and Treatment? Thyroid Cancer About Thyroid Cancer Key Statistics for Thyroid Cancer How common is thyroid cancer? ... remains very low compared with most other cancers. Statistics on survival rates for thyroid cancer are discussed ...

  12. Symmetric extension of bipartite quantum states and its use in quantum key distribution with two-way postprocessing

    Energy Technology Data Exchange (ETDEWEB)

    Myhr, Geir Ove

    2010-11-08

    Just like we can divide the set of bipartite quantum states into separable states and entangled states, we can divide it into states with and without a symmetric extension. The states with a symmetric extension - which includes all the separable states - behave classically in many ways, while the states without a symmetric extension - which are all entangled - have the potential to exhibit quantum effects. The set of states with a symmetric extension is closed under local quantum operations assisted by one-way classical communication (1-LOCC) just like the set of separable states is closed under local operations assisted by two-way classical communication (LOCC). Because of this, states with a symmetric extension often play the same role in a one-way communication setting as the separable states play in a two-way communication setting. We show that any state with a symmetric extension can be decomposed into a convex combination of states that have a pure symmetric extension. A necessary condition for a state to have a pure symmetric extension is that the spectra of the local and global density matrices are equal. This condition is also sufficient for two qubits, but not for any larger systems. We present a conjectured necessary and sufficient condition for two-qubit states with a symmetric extension. Proofs are provided for some classes of states: rank-two states, states on the symmetric subspace, Bell-diagonal states and states that are invariant under S x S, where S is a phase gate. We also show how the symmetric extension problem for multi-qubit Bell-diagonal states can be simplified and the simplified problem implemented as a semidefinite program. Quantum key distribution protocols such as the six-state protocol and the BB84 protocol effectively gives Alice and Bob Bell-diagonal states that they measure in the standard basis to obtain a raw key which they may then process further to obtain a secret error-free key. When the raw key has a high error rate, the

  13. Key Performance Indicators in the Evaluation of the Quality of Radiation Safety Programs.

    Science.gov (United States)

    Schultz, Cheryl Culver; Shaffer, Sheila; Fink-Bennett, Darlene; Winokur, Kay

    2016-08-01

    Beaumont is a multiple hospital health care system with a centralized radiation safety department. The health system operates under a broad scope Nuclear Regulatory Commission license but also maintains several other limited use NRC licenses in off-site facilities and clinics. The hospital-based program is expansive including diagnostic radiology and nuclear medicine (molecular imaging), interventional radiology, a comprehensive cardiovascular program, multiple forms of radiation therapy (low dose rate brachytherapy, high dose rate brachytherapy, external beam radiotherapy, and gamma knife), and the Research Institute (including basic bench top, human and animal). Each year, in the annual report, data is analyzed and then tracked and trended. While any summary report will, by nature, include items such as the number of pieces of equipment, inspections performed, staff monitored and educated and other similar parameters, not all include an objective review of the quality and effectiveness of the program. Through objective numerical data Beaumont adopted seven key performance indicators. The assertion made is that key performance indicators can be used to establish benchmarks for evaluation and comparison of the effectiveness and quality of radiation safety programs. Based on over a decade of data collection, and adoption of key performance indicators, this paper demonstrates one way to establish objective benchmarking for radiation safety programs in the health care environment.

  14. Long-distance continuous-variable quantum key distribution with advanced reconciliation of a Gaussian modulation

    Science.gov (United States)

    Gyongyosi, L.; Imre, S.

    2014-02-01

    The two-way continuous-variable quantum key distribution (CVQKD) systems allow higher key rates and improved transmission distances over standard telecommunication networks in comparison to the one-way CVQKD protocols. To exploit the real potential of two-way CVQKD systems a robust reconciliation technique is needed. It is currently unavailable, which makes it impossible to reach the real performance of a two-way CVQKD system. The reconciliation process of correlated Gaussian variables is a complex problem that requires either tomography in the physical layer that is intractable in a practical scenario, or high-cost calculations in the multidimensional spherical space with strict dimensional limitations. To avoid these issues, we propose an efficient logical layer-based reconciliation method for two-way CVQKD to extract binary information from correlated Gaussian variables. We demonstrate that by operating on the raw-data level, the noise of the quantum channel can be corrected in the scalar space and the reconciliation can be extended to arbitrary high dimensions. We prove that the error probability of scalar reconciliation is zero in any practical CVQKD scenario, and provides unconditional security. The results allow to significantly improve the currently available key rates and transmission distances of two-way CVQKD. The proposed scalar reconciliation can also be applied in oneway systems as well, to replace the existing reconciliation schemes.

  15. Nonorthogonal Decoy-State Quantum Key Distribution

    Institute of Scientific and Technical Information of China (English)

    LI Jing-Bo; FANG Xi-Ming

    2006-01-01

    @@ In practical quantum key distribution (QKD), weak coherent states as the photon source have a limit in the secure key rate and transmission distance because of the existence of multi-photon pulses and heavy loss in transmission line.

  16. Long distance decoy state quantum key distribution in optical fiber

    CERN Document Server

    Rosenberg, D; Hiskett, P A; Hughes, R J; Lita, A E; Nam, S W; Nordholt, J E; Peterson, C G; Rice, P R; Harrington, Jim W.; Hiskett, Philip A.; Hughes, Richard J.; Lita, Adriana E.; Nam, Sae Woo; Nordholt, Jane E.; Peterson, Charles G.; Rice, Patrick R.; Rosenberg, Danna

    2006-01-01

    The theoretical existence of photon-number-splitting attacks creates a security loophole for most quantum key distribution (QKD) demonstrations that use a highly attenuated laser source. Using ultra-low-noise, high-efficiency transition-edge sensor photo-detectors, we have implemented the first finite statistics version of a decoy state protocol in a one-way QKD system, enabling the creation of secure keys immune to both photon-number-splitting attacks and Trojan horse attacks over 107 km of optical fiber.

  17. Guns and Fear: A One-Way Street?

    Science.gov (United States)

    Hauser, Will; Kleck, Gary

    2013-01-01

    Surveys show that more than one half of gun owners report owning their firearm for self-protection. Although research has examined the effect of fear of crime on gun ownership, the issue of reciprocity and temporal order has been largely ignored. Furthermore, the effect of firearm acquisition and relinquishment on fear has not been evaluated…

  18. One Way to Design a Valence-Skip Compound

    Science.gov (United States)

    Hase, I.; Yanagisawa, T.; Kawashima, K.

    2017-02-01

    Valence-skip compound is a good candidate with high T c and low anisotropy because it has a large attractive interaction at the site of valence-skip atom. However, it is not easy to synthesize such compound because of (i) the instability of the skipping valence state, (ii) the competing charge order, and (iii) that formal valence may not be true in some compounds. In the present study, we show several examples of the valence-skip compounds and discuss how we can design them by first principles calculations. Furthermore, we calculated the electronic structure of a promising candidate of valence skipping compound RbTlCl3 from first principles. We confirmed that the charge-density wave (CDW) is formed in this compound, and the Tl atoms in two crystallographic different sites take the valence Tl1+ and Tl3+. Structure optimization study reveals that this CDW is stable at the ambient pressure, while this CDW gap can be collapsed when we apply pressure with several gigapascals. In this metallic phase, we can expect a large charge fluctuation and a large electron-phonon interaction.

  19. Sensing Audience Response - Beyond One Way Streaming of Live Performances

    NARCIS (Netherlands)

    C. Wang (Chen); P.S. Cesar Garcia (Pablo Santiago); E. Geelhoed; I. Biscoe; P. Stenton

    2013-01-01

    htmlabstractDuring a live theatre performance, Galvanic Skin Response (GSR) of 15 audience members was measured simultaneously and synchronized with video footage of performers and audience. Questionnaires explored emotions evoked during the play. The research is part of an EU Framework 7 program to

  20. Understanding one-way ANOVA using conceptual figures.

    Science.gov (United States)

    Kim, Tae Kyun

    2017-02-01

    Analysis of variance (ANOVA) is one of the most frequently used statistical methods in medical research. The need for ANOVA arises from the error of alpha level inflation, which increases Type 1 error probability (false positive) and is caused by multiple comparisons. ANOVA uses the statistic F, which is the ratio of between and within group variances. The main interest of analysis is focused on the differences of group means; however, ANOVA focuses on the difference of variances. The illustrated figures would serve as a suitable guide to understand how ANOVA determines the mean difference problems by using between and within group variance differences.

  1. More than One Way to Make a Bulletin Board.

    Science.gov (United States)

    Crane, John; And Others

    1980-01-01

    The authors provide tips for creating pleasing bulletin boards for the elementary classroom. Mood, lettering, materials, and design are considered. In addition, they suggest ideas for a thematic bulletin board for each month of the school year. (SJL)

  2. Ants can learn to forage on one-way trails.

    Directory of Open Access Journals (Sweden)

    Pedro Leite Ribeiro

    Full Text Available The trails formed by many ant species between nest and food source are two-way roads on which outgoing and returning workers meet and touch each other all along. The way to get back home, after grasping a food load, is to take the same route on which they have arrived from the nest. In many species such trails are chemically marked by pheromones providing orientation cues for the ants to find their way. Other species rely on their vision and use landmarks as cues. We have developed a method to stop foraging ants from shuttling on two-way trails. The only way to forage is to take two separate roads, as they cannot go back on their steps after arriving at the food or at the nest. The condition qualifies as a problem because all their orientation cues -- chemical, visual or any other -- are disrupted, as all of them cannot but lead the ants back to the route on which they arrived. We have found that workers of the leaf-cutting ant Atta sexdens rubropilosa can solve the problem. They could not only find the alternative way, but also used the unidirectional traffic system to forage effectively. We suggest that their ability is an evolutionary consequence of the need to deal with environmental irregularities that cannot be negotiated by means of excessively stereotyped behavior, and that it is but an example of a widespread phenomenon. We also suggest that our method can be adapted to other species, invertebrate and vertebrate, in the study of orientation, memory, perception, learning and communication.

  3. Online referrals one way capitated groups gain efficiencies, reduce errors.

    Science.gov (United States)

    2002-08-01

    An online referral system is just the latest money and time-saving tool in the e-commerce arsenal at Hill Physicians Medical Group. Using a modified version of Healinx Corp.'s secure e-mail messaging platform, Hill is testing a custom-made online referral system at two primary care practices that appear to be helping the practice boost its bottom line under capitation.

  4. Digital, One Way, Acoustic Communication in the Ocean

    Science.gov (United States)

    1990-09-01

    phase is vital to the receiver in order to be able to detect the transmitted signal. For incoherent modulation schemes, only the knowledge of the carrier...34 -5 - c=0 , =0.2T -:10 , -10 0 4 8 12 16 20 0 4 8 L2 1 20 Signol to Noise Ratio 1 9 ] Signo ] to Noise Poifo I 05 k=0.4 cc,, k=Oz 5 ’ _E 0 -5

  5. Mystery Solved: One Way To Motivate Middle Schoolers To Read.

    Science.gov (United States)

    Herder, Deb Den

    2000-01-01

    Describes a project for middle school librarians to use to motivate students to read for pleasure. Explains activities based on the idea of a mystery at the school, and describes how clues were developed and linked to books in certain genres that students had to read. (LRW)

  6. Loss tolerant one-way quantum computation -- a horticultural approach

    CERN Document Server

    Varnava, M; Rudolph, T; Varnava, Michael; Browne, Daniel E.; Rudolph, Terry

    2005-01-01

    We introduce a scheme for fault tolerantly dealing with losses in cluster state computation that can tolerate up to 50% qubit loss. This is achieved passively - no coherent measurements or coherent correction is required. We then use this procedure within a specific linear optical quantum computation proposal to show that: (i) given perfect sources, detector inefficiencies of up to 50% can be tolerated and (ii) given perfect detectors, the purity of the photon source (overlap of the photonic wavefunction with the desired single mode) need only be greater than 66.6% for efficient computation to be possible.

  7. Guns and Fear: A One-Way Street?

    Science.gov (United States)

    Hauser, Will; Kleck, Gary

    2013-01-01

    Surveys show that more than one half of gun owners report owning their firearm for self-protection. Although research has examined the effect of fear of crime on gun ownership, the issue of reciprocity and temporal order has been largely ignored. Furthermore, the effect of firearm acquisition and relinquishment on fear has not been evaluated…

  8. Monolingual:One Way towards the Integrated Software Development Environment

    Institute of Scientific and Technical Information of China (English)

    王振宇

    1989-01-01

    The software development is considered as step wise abstract-implementation process in software life cycle.This paper presents a monolingual methodology and an embry of MONOL which uses a uniform scheme to describe software development process.

  9. Efficient Constructions for One-way Hash Chains

    Science.gov (United States)

    2003-11-05

    Lecture Notes in Computer Science . International As- sociation for Cryptologic Research, Springer-Verlag, Berlin Germany...Bellare, J. Kilian, and P. Rogaway. The security of cipher block chaining. In Advances in Cryptology - Crypto ’94, pages 341–358, 1994. Lecture Notes in Computer Science Volume...editor, Advances in Cryptology – CRYPTO ’96, volume 1109 of Lecture Notes in Computer Science , pages 1–15. International

  10. On-Line Learning: One Way to Bring People Together

    Science.gov (United States)

    Goff-Kfouri, Carol Ann

    2006-01-01

    The purpose of this study was to demonstrate the benefits of on-line learning for adult learners and to further demystify three common misconceptions concerning on-line learning: students certainly do receive support from their on-line professors, the professor is pro-active rather than passive, and students may be more motivated to learn than in…

  11. Finding one's way in proteomics: a protein species nomenclature

    Directory of Open Access Journals (Sweden)

    Holzhütter Hermann-Georg

    2009-09-01

    Full Text Available Abstract Our knowledge of proteins has greatly improved in recent years, driven by new technologies in the fields of molecular biology and proteome research. It has become clear that from a single gene not only one single gene product but many different ones - termed protein species - are generated, all of which may be associated with different functions. Nonetheless, an unambiguous nomenclature for describing individual protein species is still lacking. With the present paper we therefore propose a systematic nomenclature for the comprehensive description of protein species. The protein species nomenclature is flexible and adaptable to every level of knowledge and of experimental data in accordance with the exact chemical composition of individual protein species. As a minimum description the entry name (gene name + species according to the UniProt knowledgebase can be used, if no analytical data about the target protein species are available.

  12. Dynamic one-way traffic control in automated transportation systems

    NARCIS (Netherlands)

    Ebben, M; van der Zee, DJ

    2004-01-01

    In a project on underground freight transportation using Automated Guided Vehicles, single lanes for traffic in two directions are constructed to reduce infrastructure investment. Intelligent control rules are required to manage vehicle flows such, that collision is avoided and waiting times are min

  13. Sensing Audience Response - Beyond One Way Streaming of Live Performances

    NARCIS (Netherlands)

    Wang, C.; Cesar Garcia, P.S.; Geelhoed, E.; Biscoe, I.; Stenton, P.

    2013-01-01

    During a live theatre performance, Galvanic Skin Response (GSR) of 15 audience members was measured simultaneously and synchronized with video footage of performers and audience. Questionnaires explored emotions evoked during the play. The research is part of an EU Framework 7 program to support rem

  14. Numerical approach for unstructured quantum key distribution

    Science.gov (United States)

    Coles, Patrick J.; Metodiev, Eric M.; Lütkenhaus, Norbert

    2016-05-01

    Quantum key distribution (QKD) allows for communication with security guaranteed by quantum theory. The main theoretical problem in QKD is to calculate the secret key rate for a given protocol. Analytical formulas are known for protocols with symmetries, since symmetry simplifies the analysis. However, experimental imperfections break symmetries, hence the effect of imperfections on key rates is difficult to estimate. Furthermore, it is an interesting question whether (intentionally) asymmetric protocols could outperform symmetric ones. Here we develop a robust numerical approach for calculating the key rate for arbitrary discrete-variable QKD protocols. Ultimately this will allow researchers to study `unstructured' protocols, that is, those that lack symmetry. Our approach relies on transforming the key rate calculation to the dual optimization problem, which markedly reduces the number of parameters and hence the calculation time. We illustrate our method by investigating some unstructured protocols for which the key rate was previously unknown.

  15. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  16. Quantum key management

    Science.gov (United States)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  17. Wind Turbine Contingency Control Through Generator De-Rating

    Science.gov (United States)

    Frost, Susan; Goebel, Kai; Balas, Mark

    2013-01-01

    Maximizing turbine up-time and reducing maintenance costs are key technology drivers for wind turbine operators. Components within wind turbines are subject to considerable stresses due to unpredictable environmental conditions resulting from rapidly changing local dynamics. In that context, systems health management has the aim to assess the state-of-health of components within a wind turbine, to estimate remaining life, and to aid in autonomous decision-making to minimize damage to the turbine. Advanced contingency control is one way to enable autonomous decision-making by providing the mechanism to enable safe and efficient turbine operation. The work reported herein explores the integration of condition monitoring of wind turbines with contingency control to balance the trade-offs between maintaining system health and energy capture. The contingency control involves de-rating the generator operating point to achieve reduced loads on the wind turbine. Results are demonstrated using a high fidelity simulator of a utility-scale wind turbine.

  18. Secret Key Generation From Mobility

    CERN Document Server

    Gungor, Onur; Koksal, C Emre

    2011-01-01

    We consider secret key generation from relative localization information of a pair of nodes in a mobile wireless network in the presence of a mobile eavesdropper. Our scheme consists of two phases: in the first phase, legitimate node pair exchanges beacon signals to establish localization information based on noisy observations of these beacons; in the second phase, nodes generate secret key bits via a public discussion. Our problem can be categorized under the source models of information theoretic secrecy, where the distance between the legitimate nodes acts as the observed common randomness. We characterize the achievable secret key bit rate in terms of the observation noise variance at the legitimate nodes and the eavesdropper. This work provides a framework that combines information theoretic secrecy and wireless localization, and proves that the localization information provides a significant additional resource for secret key generation in mobile wireless networks.

  19. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  20. Finite-key security analysis for multilevel quantum key distribution

    Science.gov (United States)

    Brádler, Kamil; Mirhosseini, Mohammad; Fickler, Robert; Broadbent, Anne; Boyd, Robert

    2016-07-01

    We present a detailed security analysis of a d-dimensional quantum key distribution protocol based on two and three mutually unbiased bases (MUBs) both in an asymptotic and finite-key-length scenario. The finite secret key rates (in bits per detected photon) are calculated as a function of the length of the sifted key by (i) generalizing the uncertainly relation-based insight from BB84 to any d-level 2-MUB QKD protocol and (ii) by adopting recent advances in the second-order asymptotics for finite block length quantum coding (for both d-level 2- and 3-MUB QKD protocols). Since the finite and asymptotic secret key rates increase with d and the number of MUBs (together with the tolerable threshold) such QKD schemes could in principle offer an important advantage over BB84. We discuss the possibility of an experimental realization of the 3-MUB QKD protocol with the orbital angular momentum degrees of freedom of photons.

  1. Quantum Key Distribution

    Science.gov (United States)

    Seshu, Ch.

    Quantum Key Distribution (QKD) uses Quantum Mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages.

  2. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  3. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  4. Quantum dense key distribution

    CERN Document Server

    Degiovanni, I P; Castelletto, S; Rastello, M L; Bovino, F A; Colla, A M; Castagnoli, G C

    2004-01-01

    This paper proposes a new protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than BB84 one. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.

  5. Two Methods for Extending Quantum Key Warehouse

    Institute of Scientific and Technical Information of China (English)

    WU Min; LIAO Chang-jun; LIU Song-hao

    2006-01-01

    Because the rates of quantum key distribution systems are too low,the interleaving technique and interpolation technique are used to extend the capacity of the quantum key warehouse to increase the quantum key rates of quantum secure communication systems. the simulation technique can extend random sequences and that their randomness are invariable. The correlative theory and technique of digital singal processing is an effective method of extending the quantum dey warehouse.

  6. Effects of shear keys on nonlinear seismic responses of an arch-gravity dam

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    In the paper,the added tangential nonlinear springs are introduced to represent the effects of one-way and two-way shear keys. The added tangential stiffness coefficient is relative to the joint opening and the relative tangential movement and determined numerically by using a refined model of shear keys.The user subroutine of nonlinear spring elements has been implemented into ABAQUS program.The seismic responses of an arch-gravity dam are mainly examined.It is shown by the results that a significant increase of about 17%-30%in joint opening can be observed for the dam with one-way shear keys;the two-way shear keys are beneficial to restrain the sliding displacement along both the radial and vertical directions,whereas the one-way shear keys mainly restrain the displacement along the radial direction;for the dam with shear keys,the maximum arch stress is increased,the cantilever stress is reduced,and the location of the maximum cantilever stress is also moved from the dam heel to the midheight of the cantilever.

  7. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  8. One-way propagators coupled with reflection/transmission coefficients for seismogram synthesis in complex media%基于耦合反射/透射系数单程波传播算子的地震波模拟研究

    Institute of Scientific and Technical Information of China (English)

    孙伟家; 符力耘; 姚振兴

    2009-01-01

    The one-way and one-return approximation is a multiple-forescattering-single-backscattering (MFSB) approximation. Compared with the full-waveform numerical methods, one-way approximation leads to a great saving of computing time and memory, which makes it possible to modelling wave propagation in long distances. In this article, we combine both the one-return and separation-of-variables approximations to develop a new one-way propagator coupled with reflection/transmission (R/T) coefficients for seismogram synthesis in complex media. The method is derived from establishing simultaneous generalized Lippmann-Schwinger equations in two adjoining heterogeneous layers followed by the separation-of-variables and one-return approximations. The resulting one-way propagator consists of two parts: the separation-of-variables screen propagator and the R/T operators that account for amplitude variations with incident angles across interfaces. The separation-of-variables screen propagator for one-way wave propagation accounts for wide angles in large-contrast media. The R/T coefficients are the implicit function of dip angle of geology subsurface, whose calculation is coupled with one-way propagation simulation in a natural manner. We benchmark the presented method against the full-waveform boundary element (BE) method for two numerical examples and a real geology structure, which shows that the presented method simulate the reflected waves well in travel time, amplitude, and waveform for various velocity contrasts across interfaces.%单程波近似实际上是一种多次前向散射和单次后向散射近似.利用单程波近似来描述波传播可以极大地节省地震数值模拟的计算时间和内存,实现地震波长距离传播模拟和三维地震模拟快速计算.本文基于单程波近似和波动积分方程的分离变量逼近,从广义Lippmann-Schwinger波动积分方程推导出耦合反射/透射系数的单程波传播算子.该算子由两部分构

  9. Microwave Photonics Parallel Quantum Key Distribution

    CERN Document Server

    Mora, Jose; Amaya, Waldimar; Martinez, Alfonso; Munoz, Victor Garcia-; Calvo, David; Capmany, Jose

    2011-01-01

    The incorporation of multiplexing techniques used in Microwave Photonics to Quantum Key Distribution (QKD) systems bring important advantages enabling the simultaneous and parallel delivery of multiple keys between a central station and different end-users in the context of multipoint access and metropolitan networks, or by providing higher key distribution rates in point to point links by suitably linking the parallel distributed keys. It also allows the coexistence of classical information and quantum key distribution channels over a single optical fibre infrastructure. Here we show, for the first time to our knowledge, the successful operation of a two domain (subcarrier and wavelength division) multiplexed strong reference BB84 quantum key distribution system. A four independent channel QKD system featuring 10 kb/s/channel over an 11 km link with Quantum Bit Error Rate (QBER) < 2 % is reported. These results open the way for multi-quantum key distribution over optical fiber networks.

  10. USING DEPOSIT INTEREST RATES IN SETTING LOAN INTEREST RATES: EVIDENCE FROM TURKEY

    OpenAIRE

    Önder Kaymaz; Özgür Kaymaz

    2011-01-01

    Bank credit margins are set by two dynamics: loan interest rates and deposit interest rates. The latter is the leading funding cost for the commercial banks. Sampling the period running from the last financial quarter of 2002 to the last financial quarter of 2009, we consider all the listed commercial banks operating in Turkey. We obtain strong evidence of one-way causality between loan interest rates and deposit interest rates. In setting their loan interest rates, banks use deposit interest...

  11. The Homomorphic Key Agreement

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    There are various challenges that are faced in group communication, so it is necessary to ensure session key. Key agreement is the fundamental cryptographic primitive for establishing a secure communication. It is a process of computing a shared secret contributed by two or more entities such that no single node can predetermine the resulting value. An authenticated key agreement is attained by combining the key agreement protocol with digital signatures. After a brief introduction to existing key agreement in group communication, Making use of the additive-multiplicative homomorphism in the integer ring defined by Sander and Tschudin: A new protocols, called the homomorphism key agreement, was designed, which can be self-contributory, robust, scalable and applicable in group communication.

  12. Key Account Management

    OpenAIRE

    Dvořák, Dalibor

    2007-01-01

    This note tries to explain concept of key account management (KAM), factors leading to importance of this emerging concept, criteria to determine key accounts from customer base, benefits to both buyers and sellers agreeing to practice it, stages of KAM relationship, conditions under which power lies with buyer or seller, outlines risks faced by both the parties, key success factors, challenges faced in implementing this concept and relevance to infrastructure sector.

  13. THE EFFECTS OF OPEN MARKET INTEREST RATES ON MALAYSIAN COMMERCIAL BANKS’ INTEREST RATE SPREAD: AN EMPIRICAL ANALYSIS

    OpenAIRE

    2002-01-01

    In this paper we investigate the effect of changes in open market interest rates on the interest rate spread of Malaysian commercial banks. This is performed by examining the causality and patterns of reactions of banking rates with respect to variation in open market rates. Based on vector autoregression analysis we show that there is one-way causation running from the open market rates to banking rates. Changes in open market rates significantly cause changes in the spread and deposit rates...

  14. Quantum key distribution based on phase encoding and polarization measurement

    CERN Document Server

    Ma, H Q; Zhao, J L; Ma, Hai-Qiang; Wu, Ling-An; Zhao, Jian-Ling

    2007-01-01

    A one-way quantum key distribution scheme based on intrinsically stable Faraday-mirror type Michelson interferometers with four-port polarizing beampslitters has been demonstrated which can compensate for birefringence effects automatically. The encoding is performed with phase modulators, but decoding is accomplished through measurement of the polarization state of Bob's photons. An extinction ratio of about 30dB was maintained for several hours over 50km of fiber at 1310nm without any adjustment to the setup, which shows its good potential for practical systems

  15. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  16. Financial Key Ratios

    Directory of Open Access Journals (Sweden)

    Tănase Alin-Eliodor

    2014-08-01

    Full Text Available This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  17. The compact key

    NARCIS (Netherlands)

    NN,

    1966-01-01

    Here is given a sample of a new sort of identification key, recently developed by Dr. P. W. Leenhouts of the Rijksherbarium. Having to sort many specimens of Sapindaceae into genera, he became dissatisfied with the common dichotomous key, which too often does not work when the material is not comple

  18. A Novel Re-keying Function Protocol (NRFP For Wireless Sensor Network Security

    Directory of Open Access Journals (Sweden)

    Naif Alsharabi

    2008-12-01

    Full Text Available This paper describes a novel re-keying function protocol (NRFP for wireless sensor network security. A re-keying process management system for sensor networks is designed to support in-network processing. The design of the protocol is motivated by decentralization key management for wireless sensor networks (WSNs, covering key deployment, key refreshment, and key establishment. NRFP supports the establishment of novel administrative functions for sensor nodes that derive/re-derive a session key for each communication session. The protocol proposes direct connection, in-direct connection and hybrid connection. NRFP also includes an efficient protocol for local broadcast authentication based on the use of one-way key chains. A salient feature of the authentication protocol is that it supports source authentication without precluding in-network processing. Security and performance analysis shows that it is very efficient in computation, communication and storage and, that NRFP is also effective in defending against many sophisticated attacks.

  19. Is the Green Key standard the golden key for sustainability measurement in the hospitality sector?

    NARCIS (Netherlands)

    Rietbergen, M.G.; Van Rheede, A.

    2014-01-01

    The Green Key is an eco-rating program that aims at promoting sustainable business practices in the hospitality sector. The Green Key assesses amongst others the sustainable management of energy, water and waste within hotels and other hospitality firms. The Green Key standard awards points if speci

  20. Is the Green Key standard the golden key for sustainability measurement in the hospitality sector?

    NARCIS (Netherlands)

    Rietbergen, M.G.; Van Rheede, A.

    2014-01-01

    The Green Key is an eco-rating program that aims at promoting sustainable business practices in the hospitality sector. The Green Key assesses amongst others the sustainable management of energy, water and waste within hotels and other hospitality firms. The Green Key standard awards points if

  1. 2.23 GHz gating InGaAs/InP single-photon avalanche diode for quantum key distribution

    CERN Document Server

    Zhang, Jun; Walenta, Nino; Barreiro, Claudio; Thew, Rob; Zbinden, Hugo

    2010-01-01

    We implement an InGaAs/InP single-photon avalanche diode (SPAD) for single-photon detection with the fastest gating frequency reported so far, of 2.23 GHz, which approaches the limit given by the bandwidth of the SPAD - 2.5 GHz. We propose a useful way to characterize the afterpulsing distribution for rapid gating that allows for easy comparison with conventional gating regimes. We compare the performance of this rapid gating scheme with free-running detector and superconducting single-photon detector (SSPD) for the coherent one-way quantum key distribution (QKD) protocol. The rapid gating system is well suited for both high-rate and long-distance QKD applications, in which Mbps key rates can be achieved for distances less than 40 km with 50 ns deadtime and the maximum distance is limited to ~190km with 5 $\\mu$s deadtime. These results illustrate that the afterpulsing is no longer a limiting factor for QKD.

  2. Finite-key analysis of a practical decoy-state high-dimensional quantum key distribution

    Science.gov (United States)

    Bao, Haize; Bao, Wansu; Wang, Yang; Zhou, Chun; Chen, Ruike

    2016-05-01

    Compared with two-level quantum key distribution (QKD), high-dimensional QKD enables two distant parties to share a secret key at a higher rate. We provide a finite-key security analysis for the recently proposed practical high-dimensional decoy-state QKD protocol based on time-energy entanglement. We employ two methods to estimate the statistical fluctuation of the postselection probability and give a tighter bound on the secure-key capacity. By numerical evaluation, we show the finite-key effect on the secure-key capacity in different conditions. Moreover, our approach could be used to optimize parameters in practical implementations of high-dimensional QKD.

  3. An Alternative to Keys

    Science.gov (United States)

    O'Hagan, James

    1977-01-01

    For the secondary school, the author discourages the use of dichotomous keys in favor of a punch-card system. The system is readily constructed by students for use in plant and animal classification. (CP)

  4. Keys to the City

    DEFF Research Database (Denmark)

    Monsson, Christian Kjær

    2014-01-01

    Review of: Keys to the City: How Economics, Institutions, Social Interaction, and Politics Shape Development / Michael Storper Princeton University Press, Princeton, NJ, 2013, 288 pp., $39.95/£27.95 (cloth), ISBN 9780691143118......Review of: Keys to the City: How Economics, Institutions, Social Interaction, and Politics Shape Development / Michael Storper Princeton University Press, Princeton, NJ, 2013, 288 pp., $39.95/£27.95 (cloth), ISBN 9780691143118...

  5. Key concepts in energy

    CERN Document Server

    Madureira, Nuno Luis

    2014-01-01

    Highlights how key energy concepts surfaced, tracing their evolution throughout history to encompasses four economic concepts and four technological-engineering concepts developed through their history to conclude with current economic and environmental sciences Considers the process of energy-substitutions through complementary usages, hybridization and technological mixes Combines a conceptual approach with key theoretical concepts from engineering, geological and economic sciences providing cross disciplinary overview of energy fundamentals in a short and focused reading

  6. Secret Key Crypto Implementations

    Science.gov (United States)

    Bertoni, Guido Marco; Melzani, Filippo

    This chapter presents the algorithm selected in 2001 as the Advanced Encryption Standard. This algorithm is the base for implementing security and privacy based on symmetric key solutions in almost all new applications. Secret key algorithms are used in combination with modes of operation to provide different security properties. The most used modes of operation are presented in this chapter. Finally an overview of the different techniques of software and hardware implementations is given.

  7. Enhanced Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Baojiang Cui

    2015-01-01

    Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.

  8. 负载纳米粒子的壳聚糖单向缓释膜的制备及理化性质研究%Preparation and characterization of nanoparticles in-loaded one-way release-controlled chitosan membrane

    Institute of Scientific and Technical Information of China (English)

    李书仪; 夏婷; 俞玫

    2014-01-01

    Objective To prepare and characterize nanoparticles in-loaded one-way release-controlled chitosan membrane,and to explore the release-controlled rule of the film in vitro.Methods The chitosan nanoparticles were prepared by inverse crosslinking-emulsion method.The one-way release-controlled membrane was prepared by a casting method.Transmission electron microscope (TEM) was used to evaluate the morphological properties and particle size analyzer was used to analyze particle size distribution.The morphology of the membrane was inspected through scanning electron microscope (SEM).MTT assay was applied to determine the biological safety of chitosan nanoparticles.The distribution of the nanoparticles was observed by fluorescence microscope.The in vitro release studies were adopted to evaluate the release-controlled rule.Results The four kinds of nanoparticles had spherical shapes and uniform particle size.The size of the hyaluronic acid-coated chitosan nanoparticle was (255.40±39.10) nm.Hyaluronic acid-coated chitosan nanoparticles showed the best property of sustained release and biocompatibility.The membrane had a loose inner layer and a dense outer layer,and the distribution of the nanoparticles was uniform in the inner layer of the membrane.The release of protein from membrane was unidirectional and the membrane displayed good controlled release property.Conclusions The nanoparticles in-loaded one-way release-controlled chitosan membrane presents good one-way sustained release performance.It is potentially useful in delivery system of growth factors.%目的 将壳聚糖纳米粒子与壳聚糖单向缓释膜结合,制备得到负载纳米粒子的壳聚糖单向缓释膜,并对其理化性质及体外释放性能进行研究.方法 采用反相乳化法制备壳聚糖纳米粒子,采用流延法制备壳聚糖单向缓释膜,通过透射电镜、扫描电镜和粒度分析仪检测纳米粒子的形态、大小及壳聚糖单向缓释膜表面形貌,MTT

  9. A Loss-Tolerant Group Key Management Scheme with Revocation Capability for Wireless Sensor Network

    Institute of Scientific and Technical Information of China (English)

    LI Lin-chun; LI Jian-hua; YI Ping; PAN Jun

    2009-01-01

    A new group key management scheme against the unreliable wireless communication channel and unsafe environment was proposed for wireless sensor network (WSN). In the proposed scheme, broadcast polynomial, generated over finite field Fq based on the secret sharing, was employed to revoke compromised sensor nodes. In order to tolerate key-update message loss, group session keys were generated as one-way hash chain sequence and distributed in advance. The analysis showes that the scheme has better performance in terms of the computation and communication overhead.

  10. Experimental long-distance decoy-state quantum key distribution based on polarization encoding.

    Science.gov (United States)

    Peng, Cheng-Zhi; Zhang, Jun; Yang, Dong; Gao, Wei-Bo; Ma, Huai-Xin; Yin, Hao; Zeng, He-Ping; Yang, Tao; Wang, Xiang-Bin; Pan, Jian-Wei

    2007-01-05

    We demonstrate the decoy-state quantum key distribution (QKD) with one-way quantum communication in polarization space over 102 km. Further, we simplify the experimental setup and use only one detector to implement the one-way decoy-state QKD over 75 km, with the advantage to overcome the security loopholes due to the efficiency mismatch of detectors. Our experimental implementation can really offer the unconditionally secure final keys. We use 3 different intensities of 0, 0.2, and 0.6 for the light sources in our experiment. In order to eliminate the influences of polarization mode dispersion in the long-distance single-mode optical fiber, an automatic polarization compensation system is utilized to implement the active compensation.

  11. Drilling Difficulty Analysis and Key Technology for Increasing Penetration Rate in Bamai Area%巴麦地区钻井难点分析与提速关键技术

    Institute of Scientific and Technical Information of China (English)

    赵国顺; 郭宝玉; 蒋金宝

    2011-01-01

    巴麦地区是中国石化在西北地区的勘探开发新区,钻井过程中存在中上部地层阻卡严重,二叠系、石炭系井壁稳定性差,深部地层可钻性差、机械钻速低等技术难点.针对这些技术难点,进行了高压喷射钻井技术和优化水力参数的研究与现场试验,优选了钻头和螺杆类型,进行了涡轮复合钻井技术研究与现场试验,提出了微裂缝地层井壁稳定技术.结果表明:高压喷射钻井技术与常规钻井相比,平均机械钻速提高26.0%~29.3%;(o)311.1和(o)215.9 mm井眼段采用优选的钻头,机械钻速分别提高29.0%和43.0%;二开和四开井段采用优选的螺杆,机械钻速提高27.0%~100.0%;高速涡轮复合钻井与常规钻井相比,机械钻速提高146.0%,与螺杆复合钻井相比机械钻速提高20.0%;中速涡轮复合钻井与螺杆复合钻井相比,机械钻速提高23.0%;应用微裂缝地层井壁稳定技术后未出现井壁失稳问题,实现了微裂缝地层安全钻井.%Bamai Area is a new exploration area in Northwest China. A series of drilling problems occurred during drilling,such as drillpipe stuck in upper layers,poor wellbore stability in Permian system and Carboniferous system,low penetration rate in deep layers etc. In order to solve these problems,high pressure jet drilling and hydraulic parameters optimization were investigated and tested at wellsite. Drilling bit and screw were optimized, compound PDM drilling technology were investigated and tested and the wellbore stability technology for micro-cracks formation was put forwarded. The test results showed that high pressure jet drilling technology increased average penetration rate by 26. 0% - 29. 3% compared with conventional drilling technology. The optimized drill bit improved average penetration rate by 29. 0% and 43. 0% for φ311. 1 and φ215. 9 mm hole respectively. Optimized compound PDM(screw)drilling technology increased drilling rate by

  12. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  13. Bangladesh: giving girls the "key of keys".

    Science.gov (United States)

    Chhabra, R

    1998-01-01

    In Bangladesh, 100 nongovernmental organizations (NGOs) have worked with the government to create approximately 52,000 nonformal schools for children who have never attended school or have dropped out. The Bangladesh Rural Advancement Committee (BRAC) alone has 34,000 nonformal education centers. The BRAC program has been particularly effective at increasing educational opportunities for girls, and BRAC is a major implementing agency of the agreement forged by the International Labor Organization and the UN Children's Fund with the Bangladesh Garment Manufacturers Export Association, which gives about 10,000 former child garment workers a meager stipend allowing them to study instead of work. BRAC, the Grameen Bank, and several other NGOs are also developing alternative income-generating methods to compete with the exploitative working conditions suffered by impoverished girls. BRAC now has more than a million students enrolled each year, 700,000 of whom are girls. Students participate in special condensed courses in classes that average 33 pupils (20 must be girls). Gender sensitivity is incorporated at every level. BRAC also relies on community participation in running the schools, and the flexible hours and imaginative curriculum have resulted in very high attendance rates. Government actions (making primary education compulsory and tripling education expenditure) have also resulted in increased primary enrollment while special programs seek to increase the number of girls in secondary schools.

  14. Locks and Keys Service

    CERN Multimedia

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  15. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  16. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  17. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  18. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without infor

  19. How do Supervising Clinicians of a University Hospital and Associated Teaching Hospitals Rate the Relevance of the Key Competencies within the CanMEDS Roles Framework in Respect to Teaching in Clinical Clerkships?

    Science.gov (United States)

    Jilg, Stefanie; Möltner, Andreas; Berberat, Pascal; Fischer, Martin R; Breckwoldt, Jan

    2015-01-01

    Zielsetzung: Das Rollenmodell der „Canadian Medical Education Directives for Specialists“ (CanMEDS) findet auch im deutschen Sprachraum verbreitete Anwendung in der ärztlichen Weiterbildung. Unklar ist allerdings, inwieweit es auch auf die Ausbildung im Praktischen Jahr (PJ) in Deutschland anwendbar ist. Die vorliegende Studie untersucht daher, in welchem Ausmaß klinisch tätige Ärzte an einem Universitätsklinikum und dessen akademischen Lehrkrankenhäusern die sieben CanMEDS-Rollen bzw. deren Rollen-definierende Kompetenzen als relevant einschätzen und diese an PJ-Studierende zu vermitteln meinen.Methodik: 124 Ärztinnen und Ärzte aus den Fächern Innere Medizin und Chirurgie bewerteten in einem Fragebogen die Relevanz der 28 Rollen-definierenden Kompetenzen des CanMEDS-Modells („key competencies“) für folgende drei Leitfragen: „Relevanz für die persönliche tägliche Arbeit“, „Wichtigkeit für die PJ-Ausbildung“ und „Ausmaß der Umsetzung im konkreten Unterricht“.Ergebnisse: Alle Fragebögen waren hinsichtlich der Hauptfragestellung vollständig auswertbar. Für die Befragten waren alle sieben CanMEDS-Rollen in der persönlichen täglichen Arbeit wichtig und wurden als relevant für die PJ-Ausbildung eingeschätzt. Für alle Rollen wurde eine Umsetzung im konkreten Unterricht angegeben. Die Rollen „Kommunikator“ (Communicator), „Sachkundiger Mediziner“ (Medical Expert) und „Teamplayer“ (Collaborator) wurden hierbei in Bezug auf alle drei Fragen statistisch signifikant als am relevantesten eingestuft. Es zeigten sich keine Unterschiede zwischen den Fächern Innere Medizin und Chirurgie, sowie zwischen Universitätsklinik und akademischen Lehrkrankenhäusern.Schlussfolgerung: Die Befragten schätzten sämtliche Rollen-definierenden Kompetenzen des CanMEDS-Modells als relevant für ihre persönliche tägliche Arbeit ein. Ebenso bewerteten sie diese als relevant für die PJ-Ausbildung. Diese Befunde unterstützen die Eignung

  20. Secret Key Distillation for Continuous Variable Quantum Key Distribution against Gaussian Classical Eve

    Institute of Scientific and Technical Information of China (English)

    ZHAO Yi-Bo; HAN Zheng-Fu; CHEN Jin-Jian; GU You-Zhen; GUO Guang-Can

    2008-01-01

    The continuous variable quantum key distribution is expected to provide high secret key rate without single photon source and detector, while the lack of the effective key distillation method makes it unpractical under the high loss condition. Here we present a single-bit-reverse-reconciliation protocol against Gaussian classical Eve,which can distill the secret key through practical imperfect error correction with high efficiency. The simulation results show that this protocol can distill secret keys even when the transmission fibre is longer than 150 km,which may make the continuous variable scheme to outvie the single photon one.

  1. Key strategies for enhancing the cycling stability and rate capacity of LiNi0.5Mn1.5O4 as high-voltage cathode materials for high power lithium-ion batteries

    Science.gov (United States)

    Yi, Ting-Feng; Mei, Jie; Zhu, Yan-Rong

    2016-06-01

    Spinel LiNi0.5Mn1.5O4 (LNMO) is one of the most promising high voltage cathode materials for future application due to its advantages of large reversible capacity, high thermal stability, low cost, environmental friendliness, and high energy density. LNMO can provide 20% and 30% higher energy density than traditional cathode materials LiCoO2 and LiFePO4, respectively. Unfortunately, LNMO-based batteries with LiPF6-based carbonate electrolytes always suffer from severe capacity deterioration and poor thermostability because of the oxidization of organic carbonate solvents and decomposition of LiPF6, especially at elevated temperatures and water-containing environment. Hence, it is necessary to systematically and comprehensively summarize the progress in understanding and modifying LNMO cathode from various aspects. In this review, the structure, transport properties and different reported possible fading mechanisms of LNMO cathode are first discussed detailedly. And then, the major goal of this review is to highlight new progress in using proposed strategies to improve the cycling stability and rate capacity of LNMO-based batteries, including synthesis, control of special morphologies, element doping and surface coating etc., especially at elevated temperatures. Finally, an insight into the future research and further development of LNMO cathode is discussed.

  2. Physician Appraisals: Key Challenges

    Directory of Open Access Journals (Sweden)

    Klich Jacek

    2017-06-01

    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  3. Ancel Keys: a tribute

    Directory of Open Access Journals (Sweden)

    VanItallie Theodore B

    2005-02-01

    Full Text Available Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recognized to be a classic – continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  4. Ancel Keys: a tribute.

    Science.gov (United States)

    Vanitallie, Theodore B

    2005-02-14

    Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study - which was immediately recognized to be a classic - continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  5. Experimental study on flexural behavior of fiber reinforced sandwich construction with only one-way webs%单向纤维腹板增强复合材料夹层结构的受弯性能试验研究

    Institute of Scientific and Technical Information of China (English)

    周强; 刘伟庆; 方海

    2011-01-01

    Fiber reinforced sandwich composites with only one-way webs were fabricated by vacuum infusion molding process (VIMP). Test species with horizontal webs, different spaces between adjoining webs and web thicknesses were experimentally studied by four-point bending test. The failure mode and mechanism were observed and investigated. The flexural stiffness, ultimate bearing capacity and failure mode of sandwich composites were studied by classical sandwich beam theory and valid theoretical analysis model. Results of theoretical analysis are rather in agreement with the test results.%采用真空导入成型工艺,制备出单向纤维腹板增强复合材料夹层粱.对不同腹板间距、腹板厚度和增加横向腹板的试件进行了四点弯曲试验,研究其破坏模式和机理.基于经典夹层粱理论,采用有效的理论分析模型,预估了试件的抗弯刚度、破坏模式和受弯极限承载力,理论分析与试验结果较吻合.

  6. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  7. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Establishment of a Method for Content Determination of Polysaccharide in Membranous milkveteh root Applied in Fisheries Yu Xiao-qing et al. (1) Abstract Some chemical component in the traditional Chinese medicine Membranous milkvetch root can improve the ability of disease-prevention of animal and it can be applied in fisheries. In the paper, the method about content determination of polysaccharide in the root was established based on orthogonal experimental design Key words medicine; polysaccharide in Membranous milkvetch root; method of determination

  8. Ancel Keys: a tribute

    OpenAIRE

    VanItallie Theodore B

    2005-01-01

    Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recogni...

  9. Identification key to Quivira milkweeds

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document is a key to milkweed identification at Quivira National Wildlife Refuge. It contains a dichotomous key as well as a picture key. Milkweeds found on the...

  10. Quantum Key Distribution Protocol with Private-Public Key

    OpenAIRE

    Serna, Eduin H.

    2009-01-01

    A quantum cryptographic protocol based in public key cryptography combinations and private key cryptography is presented. Unlike the BB84 protocol [1] and its many variants [2,3] two quantum channels are used. The present research does not make reconciliation mechanisms of information to derive the key. A three related system of key distribution are described.

  11. ID-based Key-insulated Authenticated Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHOU Yuan; CHENG Xiao-ming; CHAI Zhen-chuan

    2007-01-01

    The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information. Comparing with the traditional certificate-based cryptography, identity-based cryptography can eliminate much of the overhead associated with the deployment and management of certificate. However, exposure of private keys can be the most devastating attack on a public key based cryptosystem since such that all security guarantees are lost. In this paper, an ID-based authenticated key agreement protocol was presented. For solving the problem of key exposure of the basic scheme, the technique of key insulation was applied and a key insulated version is developed.

  12. 相对差分单向测距(△DOR)技术在探月工程中的应用研究%Applications of Delta Differential One-way Ranging (△DOR) to Lunar Exploration Program

    Institute of Scientific and Technical Information of China (English)

    丁溯泉; 李海涛

    2011-01-01

    Delta Differential One-way Ranging (△DOR) is used for high precision angle measure- ment in many deep space exploration programs. The fundamentals of ADOR are introduced. Also, recommendations about ADOR of CCSDS (Consultative Committee for Space Data System) are presented. According to the high precision and real-time navigation requirements, the ADOR measurement schemes are designed for China's lunar exploration program whose current object is soft-land on the moon. The angle measurement precisions are analyzed in terms of the current performances of on-board and ground TT&C equipments. The resolution of the cycle ambiguity is presented. Research results show that the angle measurement precision is 25 nrad, which corresponds to about 10 m on the moon. Further, the cycle ambiguity of DOR measurements can be resolved correctly.%相对差分单向测距(△DOR)是一种高精度测角技术,在深空探测任务的高精度测定轨方案中得到广泛应用.介绍了△DOR测量的基本原理及CCSDS(国际空间数据系统委员会)关于△测量的相关标准.针对中国探月工程月面软着陆任务提出的高精度测定轨要求,分析了△DOR测量的信号形式、工作模式以及测量精度,推导了解模糊过程.研究表明,△DOR测角精度达到25nrad,对应到月球上的距离约为10m.

  13. Paediatric pharmacokinetics: key considerations

    Science.gov (United States)

    Batchelor, Hannah Katharine; Marriott, John Francis

    2015-01-01

    A number of anatomical and physiological factors determine the pharmacokinetic profile of a drug. Differences in physiology in paediatric populations compared with adults can influence the concentration of drug within the plasma or tissue. Healthcare professionals need to be aware of anatomical and physiological changes that affect pharmacokinetic profiles of drugs to understand consequences of dose adjustments in infants and children. Pharmacokinetic clinical trials in children are complicated owing to the limitations on blood sample volumes and perception of pain in children resulting from blood sampling. There are alternative sampling techniques that can minimize the invasive nature of such trials. Population based models can also limit the sampling required from each individual by increasing the overall sample size to generate robust pharmacokinetic data. This review details key considerations in the design and development of paediatric pharmacokinetic clinical trials. PMID:25855821

  14. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Determination of the Estrogen Alkylphenols and Bisphenol A in Marine Sediments by Gas Chromatography-Mass Spectrometry Deng Xu-xiu et al. (1) Abstract Octylphenol, nonylphenol and bisphenol A are recognized environmental endocrine disruptors. A quantitative method was established for the simultaneous determination of octylphenol, nonylphenol and bisphenol A in marine sediments by gas chromatography-mass spectrometry. The test sample was extracted by methanol with ultrasonic technique, purified with copper powder and carbon solid phase extraction column, and derived with heptafluorobutyric anhydride. Then the analytes were separated on HP-5ms column and determined by gas chromatography-mass. The recovery of the method was between 84.3% and 94.5%, and the LOQ of 4-N- octylphenol, nonylphenol and bisphenol A was 0.25 g/kg, 0.15 g/kg and 0.15 g/kg. Key words octylphenol; nonylphenol; bisphenol A; gas chromatography-mass spectrometry

  15. Key aspects congenital infection

    Directory of Open Access Journals (Sweden)

    Yu. V. Lobzin

    2014-01-01

    Full Text Available The key questions to solve the problem of congenital infection in the Russian Federation are: using in national practice over world accepted terminology adapted to the recommendations of the World Health Organization; representation of the modern concepts of an infectious process in the classification of congenital infections; scientific development and introducing in clinical practice the «standard case definitions», applied to different congenital infections; optimization of protocols and clinical guidelines for diagnosis, treatment and prevention of congenital infections; improvement a knowledge in the infectious disease for all  pecialists involved in the risk assessment of congenital infections, manage pregnancy and children. Based on our experience and analysis of publications, the authors suggest possible solutions.

  16. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Study on the Long-distance Transportation of Argopecten irridians concentricus ShenQin-long(1) Abstract The experiment was carried out in order to improve the survival rate of the scallop. The result indicated that keeping the water temperature at 4℃ was reasonable for the long-distance transportation of the scallop with oxygenated bags.

  17. Applied public-key steganography

    Science.gov (United States)

    Guillon, Pierre; Furon, Teddy; Duhamel, Pierre

    2002-04-01

    We consider the problem of hiding information in a steganographic framework, i.e. embedding a binary message within an apparently innocuous content, in order to establish a suspicion-free digital communication channel. The adversary is passive as no intentional attack is foreseen. The only threat is that she discovers the presence of a hidden communication. The main goal of this article is to find if the Scalar Costa Scheme, a recently published embedding method exploiting side information at the encoder, is suitable for that framework. We justify its use assessing its security level with respect to the Cachin's criterion. We derive a public-key stego-system following the ideas of R. Anderson and P. Petitcolas. This technique is eventually applied to PCM audio contents. Experimental performances are detailed in terms of bit-rate and Kullback-Leibler distance.

  18. ABSTRACTS AND KEY WORDS

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    We feed Lunatica gilva under the experimental conditions, and observe breeding and embryo's growth, optimizing larva cultivation process. After dealing with fresh water, larva survival rate in 96h is 26.5%, higher than the untreated group that is 9%. The experiment feeding different bait to larva showed that feeding diatom is better to the growth of larva, and diatom is appropriate for the early period of larva cultivation.

  19. Nanofluids research: key issues.

    Science.gov (United States)

    Wang, Liqiu; Fan, Jing

    2010-05-22

    Nanofluids are a new class of fluids engineered by dispersing nanometer-size structures (particles, fibers, tubes, droplets) in base fluids. The very essence of nanofluids research and development is to enhance fluid macroscopic and megascale properties such as thermal conductivity through manipulating microscopic physics (structures, properties and activities). Therefore, the success of nanofluid technology depends very much on how well we can address issues like effective means of microscale manipulation, interplays among physics at different scales and optimization of microscale physics for the optimal megascale properties. In this work, we take heat-conduction nanofluids as examples to review methodologies available to effectively tackle these key but difficult problems and identify the future research needs as well. The reviewed techniques include nanofluids synthesis through liquid-phase chemical reactions in continuous-flow microfluidic microreactors, scaling-up by the volume averaging and constructal design with the constructal theory. The identified areas of future research contain microfluidic nanofluids, thermal waves and constructal nanofluids.

  20. Nanofluids Research: Key Issues

    Directory of Open Access Journals (Sweden)

    Wang Liqiu

    2010-01-01

    Full Text Available Abstract Nanofluids are a new class of fluids engineered by dispersing nanometer-size structures (particles, fibers, tubes, droplets in base fluids. The very essence of nanofluids research and development is to enhance fluid macroscopic and megascale properties such as thermal conductivity through manipulating microscopic physics (structures, properties and activities. Therefore, the success of nanofluid technology depends very much on how well we can address issues like effective means of microscale manipulation, interplays among physics at different scales and optimization of microscale physics for the optimal megascale properties. In this work, we take heat-conduction nanofluids as examples to review methodologies available to effectively tackle these key but difficult problems and identify the future research needs as well. The reviewed techniques include nanofluids synthesis through liquid-phase chemical reactions in continuous-flow microfluidic microreactors, scaling-up by the volume averaging and constructal design with the constructal theory. The identified areas of future research contain microfluidic nanofluids, thermal waves and constructal nanofluids.

  1. Atmospheric Quantum Key Distribution in Daylight

    Science.gov (United States)

    Buttler, William; Hughes, Richard; Morgan, George; Nordholt, Jane; Peterson, Charles

    2001-05-01

    In quantum key distribution (QKD) single-photon transmissions generate the shared, secret random number sequences, known as cryptographic keys, that are used to encrypt and decrypt secret communications. Because the security of QKD is based on principles of quantum physics an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed an experimental QKD system that uses the four-state “BB84” protocol with non-orthogonal photon polarization states and lowest-order adaptive optics to generate shared key material over multi-kilometer atmospheric, line-of-sight paths. We will present results of a daylight demonstration of this system. Key material is built up using the transmission of a photon-pulse per bit of an initial secret random sequence. We will describe the design and operation of the system, present an analysis of the system's security, efficiency and error rate, and describe the prospects for longer-distance applications of free-space QKD.

  2. Key Updating Methods for Combinatorial Design Based Key Management Schemes

    Directory of Open Access Journals (Sweden)

    Chonghuan Xu

    2014-01-01

    Full Text Available Wireless sensor network (WSN has become one of the most promising network technologies for many useful applications. However, for the lack of resources, it is different but important to ensure the security of the WSNs. Key management is a corner stone on which to build secure WSNs for it has a fundamental role in confidentiality, authentication, and so on. Combinatorial design theory has been used to generate good-designed key rings for each sensor node in WSNs. A large number of combinatorial design based key management schemes have been proposed but none of them have taken key updating into consideration. In this paper, we point out the essence of key updating for the unital design based key management scheme and propose two key updating methods; then, we conduct performance analysis on the two methods from three aspects; at last, we generalize the two methods to other combinatorial design based key management schemes and enhance the second method.

  3. Security Proof for Quantum Key Distribution Using Qudit Systems

    CERN Document Server

    Sheridan, Lana

    2010-01-01

    We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use $d$-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with $d$. The finite-key corrections are found to be almost insensitive to $d\\lesssim 20$.

  4. Information Theoretic Secret Key Generation: Structured Codes and Tree Packing

    Science.gov (United States)

    Nitinawarat, Sirin

    2010-01-01

    This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…

  5. A threshold key escrow scheme based on public key cryptosystem

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    In key escrow field it is important to solve the problem thatuser's secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no better than that of directly using threshold cryptography. In this paper, we present a common pattern of threshold key escrow scheme based on public key cryptosystem, and a detailed design based on the improved RSA algorithm is given. The above problem is solved by this scheme.

  6. The SECOQC quantum key distribution network in Vienna

    Energy Technology Data Exchange (ETDEWEB)

    Peev, M; Pacher, C; Boxleitner, W; Happe, A; Hasani, Y [AIT Austrian Institute of Technology GmbH (formerly Austrian Research Centers GmbH-ARC), Donau-City-Strasse 1, 1220 Vienna (Austria); Alleaume, R; Diamanti, E [Telecom ParisTech and LTCI-CNRS, 37/39 rue Dareau, 75014 Paris (France); Barreiro, C; Fasel, S; Gautier, J-D; Gisin, N [Group of Applied Physics, University of Geneva, 1211, Geneva 4 (Switzerland); Bouda, J [Faculty of Informatics, Masaryk University, Botanicka 68a, 602 00, Brno (Czech Republic); Debuisschert, T; Fossier, S [Thales Research and Technology France, RD 128, 91767 Palaiseau Cedex (France); Dianati, M [University of Surrey, Guildford, Surrey GU2 7XH (United Kingdom); Dynes, J F [Toshiba Research Europe Ltd, 208 Cambridge Science Park, Cambridge CB4 0GZ (United Kingdom); Fuerst, M [Department fuer Physik, Ludwig-Maximilians-Universitaet, 80799 Muenchen (Germany); Gay, O [id Quantique SA, Chemin de la Marberie 3, 1227 Carouge/Geneva (Switzerland); Grangier, P [Laboratoire Charles Fabry de l' Institut d' Optique - CNRS - University Paris-Sud, Campus Polytechnique, RD 128, 91127 Palaiseau Cedex (France); Hentschel, M [Institute for Quantum Optics and Quantum Information, Austrian Academy of Sciences, Boltzmanngasse 3, 1090 Vienna (Austria)], E-mail: Momtchil.Peev@ait.ac.at (and others)

    2009-07-15

    In this paper, we present the quantum key distribution (QKD) network designed and implemented by the European project SEcure COmmunication based on Quantum Cryptography (SECOQC) (2004-2008), unifying the efforts of 41 research and industrial organizations. The paper summarizes the SECOQC approach to QKD networks with a focus on the trusted repeater paradigm. It discusses the architecture and functionality of the SECOQC trusted repeater prototype, which has been put into operation in Vienna in 2008 and publicly demonstrated in the framework of a SECOQC QKD conference held from October 8 to 10, 2008. The demonstration involved one-time pad encrypted telephone communication, a secure (AES encryption protected) video-conference with all deployed nodes and a number of rerouting experiments, highlighting basic mechanisms of the SECOQC network functionality. The paper gives an overview of the eight point-to-point network links in the prototype and their underlying technology: three plug and play systems by id Quantique, a one way weak pulse system from Toshiba Research in the UK, a coherent one-way system by GAP Optique with the participation of id Quantique and the AIT Austrian Institute of Technology (formerly ARC ), an entangled photons system by University of Vienna and the AIT, a continuous-variables system by Centre National de la Recherche Scientifique (CNRS) and THALES Research and Technology with the participation of Universite Libre de Bruxelles, and a free space link by the Ludwig Maximillians University in Munich connecting two nodes situated in adjacent buildings (line of sight 80 m). The average link length is between 20 and 30 km, the longest link being 83 km. The paper presents the architecture and functionality of the principal networking agent-the SECOQC node module, which enables the authentic classical communication required for key distillation, manages the generated key material, determines a communication path between any destinations in the network

  7. The SECOQC quantum key distribution network in Vienna

    Science.gov (United States)

    Peev, M.; Pacher, C.; Alléaume, R.; Barreiro, C.; Bouda, J.; Boxleitner, W.; Debuisschert, T.; Diamanti, E.; Dianati, M.; Dynes, J. F.; Fasel, S.; Fossier, S.; Fürst, M.; Gautier, J.-D.; Gay, O.; Gisin, N.; Grangier, P.; Happe, A.; Hasani, Y.; Hentschel, M.; Hübel, H.; Humer, G.; Länger, T.; Legré, M.; Lieger, R.; Lodewyck, J.; Lorünser, T.; Lütkenhaus, N.; Marhold, A.; Matyus, T.; Maurhart, O.; Monat, L.; Nauerth, S.; Page, J.-B.; Poppe, A.; Querasser, E.; Ribordy, G.; Robyr, S.; Salvail, L.; Sharpe, A. W.; Shields, A. J.; Stucki, D.; Suda, M.; Tamas, C.; Themel, T.; Thew, R. T.; Thoma, Y.; Treiber, A.; Trinkler, P.; Tualle-Brouri, R.; Vannel, F.; Walenta, N.; Weier, H.; Weinfurter, H.; Wimberger, I.; Yuan, Z. L.; Zbinden, H.; Zeilinger, A.

    2009-07-01

    In this paper, we present the quantum key distribution (QKD) network designed and implemented by the European project SEcure COmmunication based on Quantum Cryptography (SECOQC) (2004-2008), unifying the efforts of 41 research and industrial organizations. The paper summarizes the SECOQC approach to QKD networks with a focus on the trusted repeater paradigm. It discusses the architecture and functionality of the SECOQC trusted repeater prototype, which has been put into operation in Vienna in 2008 and publicly demonstrated in the framework of a SECOQC QKD conference held from October 8 to 10, 2008. The demonstration involved one-time pad encrypted telephone communication, a secure (AES encryption protected) video-conference with all deployed nodes and a number of rerouting experiments, highlighting basic mechanisms of the SECOQC network functionality. The paper gives an overview of the eight point-to-point network links in the prototype and their underlying technology: three plug and play systems by id Quantique, a one way weak pulse system from Toshiba Research in the UK, a coherent one-way system by GAP Optique with the participation of id Quantique and the AIT Austrian Institute of Technology (formerly ARCAustrian Research Centers GmbH—ARC is now operating under the new name AIT Austrian Institute of Technology GmbH following a restructuring initiative.), an entangled photons system by the University of Vienna and the AIT, a continuous-variables system by Centre National de la Recherche Scientifique (CNRS) and THALES Research and Technology with the participation of Université Libre de Bruxelles, and a free space link by the Ludwig Maximillians University in Munich connecting two nodes situated in adjacent buildings (line of sight 80 m). The average link length is between 20 and 30 km, the longest link being 83 km. The paper presents the architecture and functionality of the principal networking agent—the SECOQC node module, which enables the authentic

  8. Reference frame independent quantum key distribution

    CERN Document Server

    Laing, Anthony; Rarity, John G; O'Brien, Jeremy L

    2010-01-01

    We describe a quantum key distribution protocol based on pairs of entangled qubits that generates a secure key between two partners in an environment of unknown and slowly varying reference frame. A direction of particle delivery is required, but the phases between the computational basis states need not be known or fixed. The protocol can simplify the operation of existing setups and has immediate applications to emerging scenarios such as earth-to-satellite links and the use of integrated photonic waveguides. We compute the asymptotic secret key rate for a two-qubit source, which coincides with the rate of the six-state protocol for white noise. We give the generalization of the protocol to higher-dimensional systems and detail a scheme for physical implementation in the three dimensional qutrit case.

  9. Quantum Key Distribution Using Decoy State Protocol

    Directory of Open Access Journals (Sweden)

    Sellami Ali

    2009-01-01

    Full Text Available Problem statement: Quantum key distribution provides unconditional security guaranteed by the fundamental laws of quantum physics. Unfortunately, for real-life experimental set-ups, which mainly based on faint laser pulses, the occasional production of multi-photons and channel loss make it possible for sophisticated eavesdroppers to launch various subtle eavesdropping attacks including the Photon Number Splitting (PNS attack. The decoy state protocols recently proposed to beat PNS attack and to improve dramatically distance and secure key generation rate of Quantum Key Distribution (QKD. Approach: Objective of this study was experimental implementation of weak decoy + vacuum states QKD for increasing the performance of QKD system. To show conceptually how simple it was to apply the weak decoy + vacuum state idea to a commercial QKD system, we chosen ID-3000 commercial quantum key distribution system manufactured by id quantique. To implement the weak decoy + vacuum state protocol, we had to add some new optical and electronics components to id quantique and to attenuate each signal to the intensity of either signal state or weak decoy or vacuum state randomly. Results: In our implementation, the attenuation will be done by placing a VOA (variable optical attenuator in Alice’s side. Specifically, our QKD system required the polarizations of 2 pulses from the same signal to be orthogonal. Therefore the VOA must be polarization independent so as to attenuate the two pulses equally. The VOA utilized in experiment to attenuate signals dynamically was Intensity Modulator (IM. We had implemented weak + vacuum protocol on a modified commercial QKD system over a 25 km of telecom fibers with an unconditionally secure key rate of 6.2931x10-4 per pulse. Conclusion: By making simple modifications to a commercial quantum key distribution system, we could achieve much better performance with substantially higher key generation rate and longer distance than

  10. Experimental demonstration of subcarrier multiplexed quantum key distribution system.

    Science.gov (United States)

    Mora, José; Ruiz-Alba, Antonio; Amaya, Waldimar; Martínez, Alfonso; García-Muñoz, Víctor; Calvo, David; Capmany, José

    2012-06-01

    We provide, to our knowledge, the first experimental demonstration of the feasibility of sending several parallel keys by exploiting the technique of subcarrier multiplexing (SCM) widely employed in microwave photonics. This approach brings several advantages such as high spectral efficiency compatible with the actual secure key rates, the sharing of the optical fainted pulse by all the quantum multiplexed channels reducing the system complexity, and the possibility of upgrading with wavelength division multiplexing in a two-tier scheme, to increase the number of parallel keys. Two independent quantum SCM channels featuring a sifted key rate of 10 Kb/s/channel over a link with quantum bit error rate <2% is reported.

  11. Sets, Subsets, and Dichotomous Keys

    Science.gov (United States)

    Cole, E. James

    1973-01-01

    Discusses the procedures that should be observed in constructing a dichotomous key. The keying exercise described was used as a laboratory activity in a biology course for elementary education majors, however it could be used in other courses. (JR)

  12. The Probabilistic Model of Keys Generation of QKD Systems

    CERN Document Server

    Golubchikov, Dmitry

    2010-01-01

    The probabilistic model of keys generation of QKD systems is proposed. The model includes all phases of keys generation starting from photons generation to states detection taking characteristics of fiber-optics components into account. The paper describes the tree of events of QKD systems. Equations are found for estimation of the effectiveness of the process of sifted keys generation as well as for bit-error probability and for the rate of private keys generation.

  13. Key Concepts in Informatics: Algorithm

    Science.gov (United States)

    Szlávi, Péter; Zsakó, László

    2014-01-01

    "The system of key concepts contains the most important key concepts related to the development tasks of knowledge areas and their vertical hierarchy as well as the links of basic key concepts of different knowledge areas." (Vass 2011) One of the most important of these concepts is the algorithm. In everyday life, when learning or…

  14. Finite-key security against coherent attacks in quantum key distribution

    CERN Document Server

    Sheridan, Lana; Scarani, Valerio

    2010-01-01

    The work by Christandl, K\\"onig and Renner [Phys. Rev. Lett. 102, 020504 (2009)] provides in particular the possibility of studying unconditional security in the finite-key regime for all discrete-variable protocols. We spell out this bound from their general formalism. Then we apply it to the study of a recently proposed protocol [Laing et al., Phys. Rev. A 82, 012304 (2010)]. This protocol is meaningful when the alignment of Alice's and Bob's reference frames is not monitored and may vary with time. In this scenario, the notion of asymptotic key rate has hardly any operational meaning, because if one waits too long time, the average correlations are smeared out and no security can be inferred. Therefore, finite-key analysis is necessary to find the maximal achievable secret key rate and the corresponding optimal number of signals.

  15. KeyChains: A Decentralized Public-Key Infrastructure

    Science.gov (United States)

    2006-03-02

    exposed. This problem is easily solved in KeyChains, taking inspiration from existing techniques: certificate expiration, revocation lists and online...the peer. The peer maintains an access control list indicating what operations (key storage, key retrieval, and peer management) are permitted to a...2002, Norfolk, VA, September 2002. [9] http://www.umiacs.umd.edu/˜mmarsh/ CODEX /. [10] A. Datta, M. Hauswirth, and K. Aberer. Beyond ”web of trust

  16. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    Science.gov (United States)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  17. Shelter Upgrading Manual: Key worker Shelters.

    Science.gov (United States)

    1981-05-01

    integrally with the waffle slab . Typical details are shown below. Spans between columns normally vary from 15 to 36 feet. A A .a 4W COLUMN IVN aRS-&W...joist and one-way slab , beam and girder p. 4-10 Waffle slabs p.4-6 Double tee p. 4-12 Slab and girder p.4-8 Hollow-core p. 4-14 One-way slab and girder...engineering or construction features. Columns are concrete and are constructed integrally with the floor slabs in a variety of ways as shown below

  18. Variation Tendency Analysis of Prevalence of Incidence Rate of Human Brucellosis for Key Populations in Xilin Gol League During 2010-2014%2010-2014年锡林郭勒盟重点人群布病发病率趋势分析

    Institute of Scientific and Technical Information of China (English)

    曹宁; 闫涛; 朱浩; 张星光

    2016-01-01

    目的:通过报道2010-2014年锡林郭勒盟人间布病的发病率及其变化趋势,评价该地区2010-2014年的布病整体流行情况,为进一步防治策略的制定提供科学依据。方法本研究在2010-2014年间采用随机整群抽样的方法共抽取了96090名调查对象,同时对其进行血清学检测,根据布病诊断标准对调查对象进行诊断,以此描述锡林郭勒盟地区人间布病的发病率。结果2010-2014年锡林郭勒盟重点人群布病发病率为17.87‰。2010-2014年锡林郭勒盟人间布病发病率呈下降趋势,在2014年达到最低。绝大多数旗县(市区)5年间布病疫情变化有统计学意义(P<0.05)。结论2010-2014年锡林郭勒盟重点人群的布病疫情呈下降趋势,但仍处于较高水平,锡林郭勒盟的布病防治工作仍然需要进一步开展。%Objectives To show incidence rate of human brucellosis for key populations and describe its distribution and varition in Xilin Gol League during 2010-2014; to provide reference for brucellosis intervention. Methods We included 96091 participants in this study by random cluster sampling during the period 2010-2014. In addition, we conducted serological testing for participants to describe the incidence of human brucellosis. Results The average incidence rate of human brucellosis for key populations in Xilin Gol League during 2010-2014 was 17.87‰. Incidence rate of brucellosis among key populations of Xilin Gol League clearly decreased during 2010-2014, and it was lowest in 2014. The epidemic changes of brucellosis in most districts have statistical significance (P<0.05). Conclusions The incidence of human brucellosis for key populations of Xilin Gol League clearly decreased during 2010-2014, but also stayed in a high level, it remind us that prevention efforts should be strengthened in the study region.

  19. Multiple-Access Quantum Key Distribution Networks

    CERN Document Server

    Razavi, Mohsen

    2011-01-01

    This paper addresses multi-user quantum key distribution networks, in which any two users can mutually exchange a secret key without trusting any other nodes. The same network also supports conventional classical communications by assigning two different wavelength bands to quantum and classical signals. Time and code division multiple access (CDMA) techniques, within a passive star network, are considered. In the case of CDMA, it turns out that the optimal performance is achieved at a unity code weight. A listen-before-send protocol is then proposed to improve secret key generation rates in this case. Finally, a hybrid setup with wavelength routers and passive optical networks, which can support a large number of users, is considered and analyzed.

  20. ARQ-Based Secret Key Sharing

    CERN Document Server

    Ghany, Mohamed Abdel; Gamal, Hesham El

    2008-01-01

    This paper develops a novel framework for sharing secret keys using existing Automatic Repeat reQuest (ARQ) protocols. Our approach exploits the multi-path nature of the wireless environment to hide the key from passive eavesdroppers. The proposed framework does not assume the availability of any prior channel state information (CSI) and exploits only the one bit ACK/NACK feedback from the legitimate receiver. Compared with earlier approaches, the main innovation lies in the distribution of key bits among multiple ARQ frames. Interestingly, this idea allows for achieving a positive secrecy rate even when the eavesdropper experiences more favorable channel conditions, on average, than the legitimate receiver. In the sequel, we characterize the information theoretic limits of the proposed schemes, develop low complexity explicit implementations, and conclude with numerical results that validate our theoretical claims.

  1. An Internet Key Exchange Protocol Based on Public Key Infrastructure

    Institute of Scientific and Technical Information of China (English)

    朱建明; 马建峰

    2004-01-01

    Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs). Public key infrastructure (PKI) is considered as a key element for providing security to new distributed communication networks and services. In this paper, we concentrate on the properties of the protocol of Phase 1 IKE. After investigating IKE protocol and PKI technology, we combine IKE protocol and PKI and present an implementation scheme of the IKE based on PKI. Then, we give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange.

  2. A Note on an Improved Self-Healing Group Key Distribution Scheme

    Directory of Open Access Journals (Sweden)

    Hua Guo

    2015-09-01

    Full Text Available In 2014, Chen et al. proposed a one-way hash self-healing group key distribution scheme for resource-constrained wireless networks in the journal of Sensors (14(14:24358-24380, doi: 10.3390/ s141224358. They asserted that their Scheme 2 achieves mt-revocation capability, mt-wise forward secrecy, any-wise backward secrecy and has mt-wise collusion attack resistance capability. Unfortunately, this paper pointed out that their scheme does not satisfy the forward security, mt-revocation capability and mt-wise collusion attack resistance capability.

  3. Secure Session Mobility using Hierarchical Authentication Key Management in Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Zubair

    2014-05-01

    Full Text Available In this paper we propose a novel authentication mechanism for session mobility in Next Generation Networks named as Hierarchical Authentication Key Management (HAKM. The design objectives of HAKM are twofold: i to minimize the authentication latency in NGNs; ii to provide protection against an assortment of attacks such as denial-of-service attacks, man-in-the-middle attacks, guessing attacks, and capturing node attacks. In order to achieve these objectives, we combine Session Initiation Protocol (SIP with Hierarchical Mobile IPv6 (HMIPv6 to perform local authentication for session mobility. The concept of group keys and pairwise keys with one way hash function is employed to make HAKM vigorous against the aforesaid attacks. The performance analysis and numerical results demonstrate that HAKM outperforms the existing approaches in terms of latency and protection against the abovementioned attacks

  4. Some Key Principles for Developing Grammar Skills

    Institute of Scientific and Technical Information of China (English)

    张威

    2008-01-01

    Grammar is sometimes defined aft"the way words are put together to make correct sentences"(Ur,2004,P.75).The aim of teaching grammar is to raise the rates of the correctness of language use and help the students transfer the isolated language points to apply language.In this essay,the author introduces two kinds of Conlnlon methods in English grammar class. And there are some key principles in grammar teaching.

  5. Key Findings for Interpersonal Skills

    Science.gov (United States)

    2013-12-04

    2005). Beyond difference and domination? Intercultural communication in legal contexts. Intercultural discourse and communication . The essential...trainable and consequential to warfighters in being good strangers. These key skills include observing and adapting to variation in communicative norms...warfighters in being good strangers. These key skills include observing and adapting to variation in communicative norms; allowing civilian

  6. Keys to the Natural World.

    Science.gov (United States)

    Misiti, Frank L., Jr.

    1996-01-01

    Presents a lesson that uses the learning cycle to introduce the concept of classification and the use of dichotomous keys to identify plants and animals. Encourages students to become better observers and helps them gain confidence and experience in using simple classification keys. (JRH)

  7. Satellite-to-ground quantum key distribution

    Science.gov (United States)

    Liao, Sheng-Kai; Cai, Wen-Qi; Liu, Wei-Yue; Zhang, Liang; Li, Yang; Ren, Ji-Gang; Yin, Juan; Shen, Qi; Cao, Yuan; Li, Zheng-Ping; Li, Feng-Zhi; Chen, Xia-Wei; Sun, Li-Hua; Jia, Jian-Jun; Wu, Jin-Cai; Jiang, Xiao-Jun; Wang, Jian-Feng; Huang, Yong-Mei; Wang, Qiang; Zhou, Yi-Lin; Deng, Lei; Xi, Tao; Ma, Lu; Hu, Tai; Zhang, Qiang; Chen, Yu-Ao; Liu, Nai-Le; Wang, Xiang-Bin; Zhu, Zhen-Cai; Lu, Chao-Yang; Shu, Rong; Peng, Cheng-Zhi; Wang, Jian-Yu; Pan, Jian-Wei

    2017-09-01

    Quantum key distribution (QKD) uses individual light quanta in quantum superposition states to guarantee unconditional communication security between distant parties. However, the distance over which QKD is achievable has been limited to a few hundred kilometres, owing to the channel loss that occurs when using optical fibres or terrestrial free space that exponentially reduces the photon transmission rate. Satellite-based QKD has the potential to help to establish a global-scale quantum network, owing to the negligible photon loss and decoherence experienced in empty space. Here we report the development and launch of a low-Earth-orbit satellite for implementing decoy-state QKD—a form of QKD that uses weak coherent pulses at high channel loss and is secure because photon-number-splitting eavesdropping can be detected. We achieve a kilohertz key rate from the satellite to the ground over a distance of up to 1,200 kilometres. This key rate is around 20 orders of magnitudes greater than that expected using an optical fibre of the same length. The establishment of a reliable and efficient space-to-ground link for quantum-state transmission paves the way to global-scale quantum networks.

  8. Keys through ARQ: Theory and Practice

    CERN Document Server

    Abdallah, Yara; Youssef, Moustafa; Sultan, Ahmed; Gamal, Hesham El

    2010-01-01

    This paper develops a novel framework for sharing secret keys using the Automatic Repeat reQuest (ARQ) protocol. We first characterize the underlying information theoretic limits, under different assumptions on the channel spatial and temporal correlation function. Our analysis reveals a novel role of "dumb antennas" in overcoming the negative impact of spatial correlation on the achievable secrecy rates. We further develop an adaptive rate allocation policy, which achieves higher secrecy rates in temporally correlated channels, and explicit constructions for ARQ secrecy coding that enjoy low implementation complexity. Building on this theoretical foundation, we propose a unified framework for ARQ-based secrecy in Wi-Fi networks. By exploiting the existing ARQ mechanism in the IEEE 802.11 standard, we develop security overlays that offer strong security guarantees at the expense of only minor modifications in the medium access layer. Our numerical results establish the achievability of non-zero secrecy rates ...

  9. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Harinarayan Tiwari; Nayan Sharma

    2015-10-01

    This paper presents fundamental outcomes from an experimental study on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). Hydrodynamic performance was tested in a circulated open channel that comprised of PKW and sand bed (d50 = 0.25 mm). Instantaneous velocities were measured at 20 cross sections using Laser Doppler Velocimeter (LDV) with constant discharge and depth. Average velocity and turbulence intensities in both directions were investigated. Average longitudinal velocities are found very much consistent at every point and maximum around the midway of inlet key. In transverse direction, flow is bifurcating in two directions which are also confirmed by average transverse velocity estimation. Variation of turbulence intensity presents average 10 times higher transverse turbulence than longitudinal turbulence near inlet key of PKW.

  10. Interest Rate Transmission to Commercial Credit Rates in Austria

    OpenAIRE

    Burgstaller, Johann

    2003-01-01

    The transmission process from policy-controlled interest rates to bank lending rates deserves reconsideration owing to the implementation of the European Monetary Union (EMU) in 1999. Additional attention to the subject in Austria is due to several large banks which, in 2002, have been charged for not passing on interest rate decreases to their customers. I examine dynamic responses of commercial credit rates to changes in key policy rates and money market rates. Using Austrian data from 1995...

  11. The Efficacy of Key Performance Indicators in Ontario Universities as Perceived by Key Informants

    Science.gov (United States)

    Chan, Vivian

    2015-01-01

    The Ontario Ministry of Education and Training's Task Force on University Accountability first proposed key performance indicators (KPIs) for colleges and universities in Ontario in the early 1990s. The three main KPIs for Ontario universities are the rates of (1) graduation, (2) employment, and (3) Ontario Student Assistance Program loan default.…

  12. Smartphones Could Make Keys Obsolete

    Institute of Scientific and Technical Information of China (English)

    Matt Richtel

    2011-01-01

    @@ Front pockets and purses are slowly being emptied of one of civilization's most basic and enduring tools: the key.It's being swallowed by the cellphone.New technology lets smartphones unlock hotel, office and house doors and open garages and even car doors. It's a not-too-distant cousin of the technology that allows key fobs to remotely unlock automobiles or key cards to be waved beside electronic pads at office entrances.What's new is that it is on the device more people are using as the Swiss Army knife of electronics, in equal parts phone, memo pad, stereo, map, GPS unit, and camera and game machine.

  13. KEY TOPICS IN SPORTS MEDICINE

    Directory of Open Access Journals (Sweden)

    Amir Ali Narvani

    2006-12-01

    Full Text Available Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1 Sports injuries, rehabilitation and injury prevention, 2 Exercise physiology, fitness testing and training, 3 Drugs in sport, 4 Exercise and health promotion, 5 Sport and exercise for special and clinical populations, 6 The psychology of performance and injury. PURPOSE The Key Topics format provides extensive, concise information in an accessible, easy-to-follow manner. AUDIENCE The book is targeted the students and specialists in sports medicine and rehabilitation, athletic training, physiotherapy and orthopaedic surgery. The editors are authorities in their respective fields and this handbook depends on their extensive experience and knowledge accumulated over the years. FEATURES The book contains the information for clinical guidance, rapid access to concise details and facts. It is composed of 99 topics which present the information in an order that is considered logical and progressive as in most texts. Chapter headings are: 1. Functional Anatomy, 2. Training Principles / Development of Strength and Power, 3. Biomechanical Principles, 4. Biomechanical Analysis, 5. Physiology of Training, 6. Monitoring of Training Progress, 7. Nutrition, 8. Hot and Cold Climates, 9. Altitude, 10. Sport and Travelling, 11. Principles of Sport Injury Diagnosis, 12. Principles of Sport and Soft Tissue Management, 13. Principles of Physical Therapy and Rehabilitation, 14. Principles of Sport Injury Prevention, 15. Sports Psychology, 16. Team Sports, 17. Psychological Aspects of Injury in Sport, 18. Injury Repair Process, 19. Basic Biomechanics of Tissue Injury, 20. Plain Film Radiography in Sport, 21. Nuclear Medicine, 22. Diagnostic Ultrasound, 23. MRI Scan, 24. Other Imaging, 5. Head Injury, 26. Eye

  14. Slips of the Typewriter Key.

    Science.gov (United States)

    Berg, Thomas

    2002-01-01

    Presents an analysis of 500 submorphemic slips of the typewriter key that escaped the notice of authors and other proofreaders and thereby made their way into the published records of scientific research. (Author/VWL)

  15. Security of Quantum Key Distribution

    CERN Document Server

    Renner, R

    2005-01-01

    We propose various new techniques in quantum information theory, including a de Finetti style representation theorem for finite symmetric quantum states. As an application, we give a proof for the security of quantum key distribution which applies to arbitrary protocols.

  16. Wiki keys on mobile devices

    OpenAIRE

    Weber, Gisela; Hagedorn, Gregor

    2010-01-01

    The development of increasingly powerful mobile devices like PDAs (Personal Digital Assistants) and Smartphones, with larger displays and greater resolution makes them increasingly suitable for identification tools available directly “in the field”. One of several approaches towards this aim in the KeyToNature project is based on wiki-stored documents. Important features of wiki-based keys, such as hidden text and media information as well as links to glossary entries are su...

  17. Exchange rate regime choice

    Directory of Open Access Journals (Sweden)

    Beker Emilija

    2006-01-01

    Full Text Available The choice of an adequate exchange rate regime proves to be a highly sensitive field within which the economic authorities present and confirm themselves. The advantages and disadvantages of fixed and flexible exchange rate regimes, which have been quite relativized from the conventional point of view, together with simultaneous, but not synchronized effects of structural and external factors, remain permanently questioned throughout a complex process of exchange rate regime decision making. The paper reflects the attempt of critical identification of the key exchange rate performances with emphasis on continuous non-uniformity and (uncertainty of shelf life of a relevant choice.

  18. Quantum Key Distribution over Probabilistic Quantum Repeaters

    CERN Document Server

    Amirloo, Jeyran; Majedi, A Hamed

    2010-01-01

    A feasible route towards implementing long-distance quantum key distribution (QKD) systems relies on probabilistic schemes for entanglement distribution and swapping as proposed in the work of Duan, Lukin, Cirac, and Zoller (DLCZ) [Nature 414, 413 (2001)]. Here, we calculate the conditional throughput and fidelity of entanglement for DLCZ quantum repeaters, by accounting for the DLCZ self-purification property, in the presence of multiple excitations in the ensemble memories as well as loss and other sources of inefficiency in the channel and measurement modules. We then use our results to find the generation rate of secure key bits for QKD systems that rely on DLCZ quantum repeaters. We compare the key generation rate per logical memory employed in the two cases of with and without a repeater node. We find the cross-over distance beyond which the repeater system outperforms the non-repeater one. That provides us with the optimum inter-node distancing in quantum repeater systems. We also find the optimal exci...

  19. Detector-device-independent quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Lim, Charles Ci Wen; Korzh, Boris; Martin, Anthony; Bussières, Félix; Thew, Rob; Zbinden, Hugo [Group of Applied Physics, University of Geneva, Chemin de Pinchat 22, CH-1211 Geneva 4 (Switzerland)

    2014-12-01

    Recently, a quantum key distribution (QKD) scheme based on entanglement swapping, called measurement-device-independent QKD (mdiQKD), was proposed to bypass all measurement side-channel attacks. While mdiQKD is conceptually elegant and offers a supreme level of security, the experimental complexity is challenging for practical systems. For instance, it requires interference between two widely separated independent single-photon sources, and the secret key rates are dependent on detecting two photons—one from each source. Here, we demonstrate a proof-of-principle experiment of a QKD scheme that removes the need for a two-photon system and instead uses the idea of a two-qubit single-photon to significantly simplify the implementation and improve the efficiency of mdiQKD in several aspects.

  20. Quantum key distribution without alternative measurements

    CERN Document Server

    Cabello, A

    2000-01-01

    Entanglement swapping between Einstein-Podolsky-Rosen (EPR) pairs can be used to generate the same sequence of random bits in two remote places. A quantum key distribution protocol based on this idea is described. The scheme exhibits the following features. (a) It does not require that Alice and Bob choose between alternative measurements, therefore improving the rate of generated bits by transmitted qubit. (b) It allows Alice and Bob to generate a key of arbitrary length using a single quantum system (three EPR pairs), instead of a long sequence of them. (c) Detecting Eve requires the comparison of fewer bits. (d) Entanglement is an essential ingredient. The scheme assumes reliable measurements of the Bell operator. (20 refs).

  1. Time-cost analysis of a quantum key distribution system clocked at 100 MHz

    CERN Document Server

    Mo, Xiaofan; Chan, Philip; Healey, Chris; Hosier, Steve; Tittel, Wolfgang

    2011-01-01

    We describe the realization of a quantum key distribution (QKD) system clocked at 100 MHz. The system includes classical postprocessing implemented via software, and is operated over a 12 km standard telecommunication dark fiber in a real-world environment. A time-cost analysis of the sifted, error-corrected, and secret key rates relative to the raw key rate is presented, and the scalability of our implementation with respect to higher secret key rates is discussed.

  2. Bidirectional private key exchange using delay-coupled semiconductor lasers.

    Science.gov (United States)

    Porte, Xavier; Soriano, Miguel C; Brunner, Daniel; Fischer, Ingo

    2016-06-15

    We experimentally demonstrate a key exchange cryptosystem based on the phenomenon of identical chaos synchronization. In our protocol, the private key is symmetrically generated by the two communicating partners. It is built up from the synchronized bits occurring between two current-modulated bidirectionally coupled semiconductor lasers with additional self-feedback. We analyze the security of the exchanged key and discuss the amplification of its privacy. We demonstrate private key generation rates up to 11  Mbit/s over a public channel.

  3. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  4. Key Revocation System for DNSSEC

    Directory of Open Access Journals (Sweden)

    Gilles Guette

    2008-06-01

    Full Text Available The Doma in Name System (DNS is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions (DNSSEC has been designed to protect the DNS protocol using public key cryptography and digital signatures. In this paper, we show how DNSSEC can be attacked using compromised keys and the consequences of such attacks. Then, we propose a new revocation scheme for DNSSEC based on two new resource records. There is currently no revocation system defined in the DNSSEC standard.

  5. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  6. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  7. Experimental Long-Distance Decoy-State Quantum Key Distribution Based On Polarization Encoding

    CERN Document Server

    Peng, C Z; Ma, H X; Pan, J W; Wang, X B; Yang, D; Yang, T; Yin, H; Zeng, H P; Zhang, J; Gao, Wei-Bo; Ma, Huai-Xin; Pan, Jian-Wei; Peng, Cheng-Zhi; Wang, Xiang-Bin; Yang, Dong; Yang, Tao; Yin, Hao; Zeng, He-Ping; Zhang, Jun

    2006-01-01

    We demonstrate the decoy-state quantum key distribution (QKD) with one-way quantum communication in polarization space over 75 km. So far, our experimental implementation is the only one that really offers the unconditionally secure final keys among all the implementations of long-distance QKD with weak coherent states. We use 3 different intensities of 0, 0.2 and 0.6 for the pulses of source in our experiment. In order to eliminate the influences of polarization mode dispersion in the long-distance single-mode optical fiber, an automatic polarization compensation system is utilized to implement the active compensation. Only one detector is used in our experiment. The secure distance can be raised to 120 km given 4 detectors.

  8. Quantum key distribution using gaussian-modulated coherent states

    CERN Document Server

    Grosshans, F; Wenger, J; Brouri, R; Cerf, N J; Grangier, P; Grangier, Ph.

    2003-01-01

    Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting. The former approach is potentially advantageous because it should enable higher key distribution rates. Here we propose and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states (consisting of laser pulses containing a few hundred photons) and shot-noise-limited homodyne detection; squeezed or entangled beams are not required. Complete secret key extraction is achieved using a reverse reconciliation technique followed by privacy amplification. The reverse reconciliation technique is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories. Our table-top experiment yields a net key transmission rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per second for a line with loss...

  9. Secret Key Generation for a Pairwise Independent Network Model

    CERN Document Server

    Nitinawarat, Sirin; Barg, Alexander; Narayan, Prakash; Reznik, Alex

    2010-01-01

    We consider secret key generation for a "pairwise independent network" model in which every pair of terminals observes correlated sources that are independent of sources observed by all other pairs of terminals. The terminals are then allowed to communicate publicly with all such communication being observed by all the terminals. The objective is to generate a secret key shared by a given subset of terminals at the largest rate possible, with the cooperation of any remaining terminals. Secrecy is required from an eavesdropper that has access to the public interterminal communication. A (single-letter) formula for secret key capacity brings out a natural connection between the problem of secret key generation and a combinatorial problem of maximal packing of Steiner trees in an associated multigraph. An explicit algorithm is proposed for secret key generation based on a maximal packing of Steiner trees in a multigraph; the corresponding maximum rate of Steiner tree packing is thus a lower bound for the secret ...

  10. Free space quantum key distribution: Towards a real life application

    Science.gov (United States)

    Weier, H.; Schmitt-Manderbach, T.; Regner, N.; Kurtsiefer, Ch.; Weinfurter, H.

    2006-08-01

    Quantum key distribution (QKD) [1] is the first method of quantum information science that will find its way into our everyday life. It employs fundamental laws of quantum physics to ensure provably secure symmetric key generation between two parties. The key can then be used to encrypt and decrypt sensitive data with unconditional security. Here, we report on a free space QKD implementation using strongly attenuated laser pulses over a distance of 480 m. It is designed to work continuously without human interaction. Until now, it produces quantum keys unattended at night for more than 12 hours with a sifted key rate of more than 50 kbit/s and a quantum bit error rate between 3% and 5%.

  11. Key World Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  12. Grouted Connections with Shear Keys

    DEFF Research Database (Denmark)

    Pedersen, Ronnie; Jørgensen, M. B.; Damkilde, Lars

    2012-01-01

    This paper presents a finite element model in the software package ABAQUS in which a reliable analysis of grouted pile-to-sleeve connections with shear keys is the particular purpose. The model is calibrated to experimental results and a consistent set of input parameters is estimated so...

  13. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  14. Key Skills Influencing Student Achievement

    Science.gov (United States)

    Balch, Tonya; Gruenert, Steve

    2009-01-01

    A predictive, non-experimental, cross-sectional design (Johnson, 2001) was used to conduct a study to determine if elementary administrators' key counseling skills and select demographics predicted state-level student performance indicators in their respective schools. A secondary purpose of this study was to develop a valid and reliable on-line…

  15. Ten Keys to the Portal

    Science.gov (United States)

    Schaffhauser, Dian

    2011-01-01

    Successful web portals help users stay informed, in touch, and up to speed. They are also a telling window into the efficiency of one's institution. To develop a cutting-edge portal takes planning, communication, and research. In this article, the author presents and discusses 10 keys to portal success: (1) make critical info visible; (2) make the…

  16. [Key informers. When and How?].

    Science.gov (United States)

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  17. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin;

    2016-01-01

    We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...

  18. Overview, conclusions, and key recommendations

    NARCIS (Netherlands)

    Loeber, R.; Farrington, D.P.; Howell, J.C.; Hoeve, M.; Loeber, R.; Farrington, D.P.

    2012-01-01

    Section I of this chapter summarizes the most important points of Chapters 2 to 5 and relevant portions of Chapter 10 (which concerns European issues) by addressing key findings that are relevant for juveniles’ transition of offending from adolescence (up to age 18) into adulthood. Section I focuses

  19. Key concepts in social pedagogy

    DEFF Research Database (Denmark)

    Harbo, Lotte Junker

    2011-01-01

    and activities around key social pedagogical concepts, such as the Common Third, the 3 P’s, the Zone of Proximal Development and the Learning Zone model. In the article we explore how a joint activity, for example playing soccer, can be seen as a pedagogical activity and with what intentions it is undertaken...

  20. Finite-key analysis for time-energy high-dimensional quantum key distribution

    Science.gov (United States)

    Niu, Murphy Yuezhen; Xu, Feihu; Shapiro, Jeffrey H.; Furrer, Fabian

    2016-11-01

    Time-energy high-dimensional quantum key distribution (HD-QKD) leverages the high-dimensional nature of time-energy entangled biphotons and the loss tolerance of single-photon detection to achieve long-distance key distribution with high photon information efficiency. To date, the general-attack security of HD-QKD has only been proven in the asymptotic regime, while HD-QKD's finite-key security has only been established for a limited set of attacks. Here we fill this gap by providing a rigorous HD-QKD security proof for general attacks in the finite-key regime. Our proof relies on an entropic uncertainty relation that we derive for time and conjugate-time measurements that use dispersive optics, and our analysis includes an efficient decoy-state protocol in its parameter estimation. We present numerically evaluated secret-key rates illustrating the feasibility of secure and composable HD-QKD over metropolitan-area distances when the system is subjected to the most powerful eavesdropping attack.

  1. Key drivers of airline loyalty

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-01-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty. PMID:27064618

  2. Key drivers of airline loyalty.

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  3. Antioxidant role of glutathione S-transferases: 4-Hydroxynonenal, a key molecule in stress-mediated signaling.

    Science.gov (United States)

    Singhal, Sharad S; Singh, Sharda P; Singhal, Preeti; Horne, David; Singhal, Jyotsana; Awasthi, Sanjay

    2015-12-15

    4-Hydroxy-2-trans-nonenal (4HNE), one of the major end products of lipid peroxidation (LPO), has been shown to induce apoptosis in a variety of cell lines. It appears to modulate signaling processes in more than one way because it has been suggested to have a role in signaling for differentiation and proliferation. It has been known that glutathione S-transferases (GSTs) can reduce lipid hydroperoxides through their Se-independent glutathione-peroxidase activity and that these enzymes can also detoxify LPO end-products such as 4HNE. Available evidence from earlier studies together with results of recent studies in our laboratories strongly suggests that LPO products, particularly hydroperoxides and 4HNE, are involved in the mechanisms of stress-mediated signaling and that it can be modulated by the alpha-class GSTs through the regulation of the intracellular concentrations of 4HNE. We demonstrate that 4HNE induced apoptosis in various cell lines is accompanied with c-Jun-N-terminal kinase (JNK) and caspase-3 activation. Cells exposed to mild, transient heat or oxidative stress acquire the capacity to exclude intracellular 4HNE at a faster rate by inducing GSTA4-4 which conjugates 4HNE to glutathione (GSH), and RLIP76 which mediates the ATP-dependent transport of the GSH-conjugate of 4HNE (GS-HNE). The balance between formation and exclusion promotes different cellular processes - higher concentrations of 4HNE promote apoptosis; whereas, lower concentrations promote proliferation. In this article, we provide a brief summary of the cellular effects of 4HNE, followed by a review of its GST-catalyzed detoxification, with an emphasis on the structural attributes that play an important role in the interactions with alpha-class GSTA4-4. Taken together, 4HNE is a key signaling molecule and that GSTs being determinants of its intracellular concentrations, can regulate stress-mediated signaling, are reviewed in this article.

  4. Antioxidant Role of Glutathione S-Transferases: 4-Hydroxynonenal, a Key Molecule in Stress-Mediated Signaling

    Science.gov (United States)

    Singhal, Sharad S; Singh, Sharda P.; Singhal, Preeti; Horne, David; Singhal, Jyotsana; Awasthi, Sanjay

    2015-01-01

    4-Hydroxy-2-trans-nonenal (4HNE), one of the major end products of lipid peroxidation (LPO), has been shown to induce apoptosis in a variety of cell lines. It appears to modulate signaling processes in more than one way because it has been suggested to have a role in signaling for differentiation and proliferation. It has been known that glutathione S-transferases (GSTs) can reduce lipid hydroperoxides through their Se-independent glutathione-peroxidase activity and that these enzymes can also detoxify LPO end-products such as 4HNE. Available evidence from earlier studies together with results of recent studies in our laboratories strongly suggests that LPO products, particularly hydroperoxides and 4HNE, are involved in the mechanisms of stress-mediated signaling and that it can be modulated by the alpha-class GSTs through the regulation of the intracellular concentrations of 4HNE. We demonstrate 4HNE induced apoptosis in various cell lines is accompanied with c-Jun-N-terminal kinase (JNK) and caspase-3 activation. Cells exposed to mild, transient heat or oxidative stress acquire the capacity to exclude intracellular 4HNE at a faster rate by inducing GSTA4-4 which conjugate 4HNE to glutathione (GSH), and RLIP76 which mediates the ATP-dependent transport of the GSH-conjugate of 4HNE (GS-HNE). The balance between formation and exclusion promotes different cellular processes – higher concentrations of 4HNE promote apoptosis; whereas, lower concentrations promote proliferation. In this article, we provide a brief summary of the cellular effects of 4HNE, followed by a review of its GST-catalyzed detoxification, with an emphasis on the structural attributes that play an important role in the interactions with alpha-class GSTA4-4. Taken together, 4HNE is a key signaling molecule and that GSTs being determinants of its intracellular concentrations, can regulate stress-mediated signaling, are reviewed in this article. PMID:26476300

  5. Key to Language Learning Success

    OpenAIRE

    2015-01-01

    This paper looks at the important elements of language learning and teaching i.e. the role of teachers as well as the attitude and motivation of learners. Teachers undoubtedly play crucial roles in students’ language learning outcome which could ignite or diminish students’ motivation. Positive attitudes and motivation – instrumental or integrative and intrinsic or extrinsic – are key to successful learning. Therefore it is paramount for language teachers as well as learners to know these rol...

  6. Key Questions in Thoracic Surgery

    OpenAIRE

    Subotic, Dragan R.

    2016-01-01

    This 1000-page textbook encompasses much more than the title suggests. In fact, the title “Key questions in thoracic surgery and pulmonology” would be more fitting. The specific format of the book, with precise questions and evidence-based, but equally clear answers covering all relevant fields of pulmonology and thoracic surgery, makes this 40-chapter book a “must read” not only for residents, but also for senior pulmonologists and thoracic surgeons.

  7. Innovation, Key to Lasting Success

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    @@ Oerlikon Textile will be exhibiting at ITMA ASIA 2010 in Shanghai on its 750- -plus stand C 51/C 52 in hall W2 from 22 to 26 June 2010. Highlights of the five brands under the umbrella of the textile machinery manufacturer include the new Autoconer X5 winding machine, a new FDY technology and the Era embroidery machine. Their technological innovations illustrate the slogan under which Oerlikon Textile is appearing at the show: Innovation remains the key to success.

  8. Human Resources Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Gabčanová Iveta

    2012-03-01

    Full Text Available The article brings out a proposed strategy map and respective key performance indicators (KPIs in human resources (HR. The article provides an overview of how HR activities are supported in order to reach the partial goals of HR as defined in the strategic map. Overall the aim of the paper is to show the possibilities of using the modern Balanced Scorecard method in human capital.

  9. Satellite-to-ground quantum key distribution.

    Science.gov (United States)

    Liao, Sheng-Kai; Cai, Wen-Qi; Liu, Wei-Yue; Zhang, Liang; Li, Yang; Ren, Ji-Gang; Yin, Juan; Shen, Qi; Cao, Yuan; Li, Zheng-Ping; Li, Feng-Zhi; Chen, Xia-Wei; Sun, Li-Hua; Jia, Jian-Jun; Wu, Jin-Cai; Jiang, Xiao-Jun; Wang, Jian-Feng; Huang, Yong-Mei; Wang, Qiang; Zhou, Yi-Lin; Deng, Lei; Xi, Tao; Ma, Lu; Hu, Tai; Zhang, Qiang; Chen, Yu-Ao; Liu, Nai-Le; Wang, Xiang-Bin; Zhu, Zhen-Cai; Lu, Chao-Yang; Shu, Rong; Peng, Cheng-Zhi; Wang, Jian-Yu; Pan, Jian-Wei

    2017-08-09

    Quantum key distribution (QKD) uses individual light quanta in quantum superposition states to guarantee unconditional communication security between distant parties. In practice, the achievable distance for QKD has been limited to a few hundred kilometres, owing to the channel loss of fibers or terrestrial free space that exponentially reduced the photon rate. Satellite-based QKD promises to establish a global-scale quantum network by exploiting the negligible photon loss and decoherence in the empty out space. Here we develop and launch a low-Earth-orbit satellite to implement decoy-state QKD with over kHz key rate from the satellite to ground over a distance of up to 1,200 km, which is up to 20 orders of magnitudes more efficient than that expected using an optical fiber (with 0.2 dB/km loss) of the same length. The establishment of a reliable and efficient space-to-ground link for faithful quantum state transmission paves the way to global-scale quantum networks.

  10. Consistency of Supervisor and Peer Ratings of Assessment Interviews Conducted by Psychology Trainees

    Science.gov (United States)

    Gonsalvez, Craig J.; Deane, Frank P.; Caputi, Peter

    2016-01-01

    Observation of counsellor skills through a one-way mirror, video or audio recording followed by supervisors and peers feedback is common in counsellor training. The nature and extent of agreement between supervisor-peer dyads are unclear. Using a standard scale, supervisors and peers rated 32 interviews by psychology trainees observed through a…

  11. Simulation of three lanes one-way freeway in low visibility weather by possible traffic accidents

    Science.gov (United States)

    Pang, Ming-bao; Zheng, Sha-sha; Cai, Zhang-hui

    2015-09-01

    The aim of this work is to investigate the traffic impact of low visibility weather on a freeway including the fraction of real vehicle rear-end accidents and road traffic capacity. Based on symmetric two-lane Nagel-Schreckenberg (STNS) model, a cellular automaton model of three-lane freeway mainline with the real occurrence of rear-end accidents in low visibility weather, which considers delayed reaction time and deceleration restriction, was established with access to real-time traffic information of intelligent transportation system (ITS). The characteristics of traffic flow in different visibility weather were discussed via the simulation experiments. The results indicate that incoming flow control (decreasing upstream traffic volume) and inputting variable speed limits (VSL) signal are effective in accident reducing and road actual traffic volume's enhancing. According to different visibility and traffic demand the appropriate control strategies should be adopted in order to not only decrease the probability of vehicle accidents but also avoid congestion.

  12. A Modest Proposal: One Way to Save Journalism and Journalism Education

    Science.gov (United States)

    John, Jeffrey Alan

    2013-01-01

    This essay suggests that because anyone and everyone can now be a "journalist," the standards of the field of journalism have been greatly diminished. To regain respect for the profession and retain stature in the academy, journalism education should offer an assurance of the legitimacy of journalism program graduates by recognizing only…

  13. GROUP PRESENTATION AS ONE WAY OF INCREASING STUDENTS PARTICIPATION IN THE CLASSROOM

    Directory of Open Access Journals (Sweden)

    Clara Herlina Karjo

    2008-10-01

    Full Text Available Teaching English (TOEFL to a class of 50 students or more is a difficult task for a lecturer. Some problems will occur, for example, the improbability for all students to get equal teachers attention and equal chance for learning and studying in class. To overcome these problems, the writer conducts a quasi-experimental research involving 100 students in her two classes in Bina Nusantara University. In this research, the writer applies the group presentation method for teaching TOEFL for one semester. The research shows that group scores are slightly higher than individual students scores.

  14. GROUP PRESENTATION AS ONE WAY OF INCREASING STUDENTS’ PARTICIPATION IN THE CLASSROOM

    Directory of Open Access Journals (Sweden)

    Clara Herlina Karjo

    2008-11-01

    Full Text Available Teaching English (TOEFL to a class of 50 students or more is a difficult task for a lecturer. Some problems will occur, for example, the improbability for all students to get equal teacher’s attention and equal chance for learning and studying in class. To overcome these problems, the writer conducts a quasi-experimental research involving 100 students in her two classes in Bina Nusantara University. In this research, the writer applies the group presentation method for teaching TOEFL for one semester. The research shows that group scores are slightly higher than individual students’ scores.Keywords:

  15. sRNA Antitoxins: More than One Way to Repress a Toxin

    Directory of Open Access Journals (Sweden)

    Jia Wen

    2014-08-01

    Full Text Available Bacterial toxin-antitoxin loci consist of two genes: one encodes a potentially toxic protein, and the second, an antitoxin to repress its function or expression. The antitoxin can either be an RNA or a protein. For type I and type III loci, the antitoxins are RNAs; however, they have very different modes of action. Type I antitoxins repress toxin protein expression through interacting with the toxin mRNA, thereby targeting the mRNA for degradation or preventing its translation or both; type III antitoxins directly bind to the toxin protein, sequestering it. Along with these two very different modes of action for the antitoxin, there are differences in the functions of the toxin proteins and the mobility of these loci between species. Within this review, we discuss the major differences as to how the RNAs repress toxin activity, the potential consequences for utilizing different regulatory strategies, as well as the confirmed and potential biological roles for these loci across bacterial species.

  16. More than One Way to Find the Neutrino Mixing Angle Theta13 from Reactor Data

    CERN Document Server

    Khan, Amir N; Ralston, John P

    2013-01-01

    We show that the analysis methods used in recent work of the Daya Bay and RENO collaborations are relatively insensitive to the physical variables and have been evaluated with non-standard measures of significance. The main features of the methods consist of variationally fitting many more parameters than data points. We find evidence that over-parameterization of data fits actually degrades the experimental determination of sin^2(2theta13). Simpler, more transparent methods can improve its extraction from the data, fully exploiting the greatly improved systematic errors, made possible by the multiple detectors and superb hardware construction of these experiments.

  17. Twenty-One Ways to Use Music in Teaching the Language Arts.

    Science.gov (United States)

    Cardarelli, Aldo F.

    Twenty-one activities that integrate music and the language arts in order to capitalize on children's interests are described in this paper. Topics of the activities are as follows: alphabetical order, pantomime, vocabulary building from words of a favorite song, words that are "the most (whatever)" from songs, mood words, a configuration clue…

  18. Study of Unrecovered Strain and Critical Stresses in One-Way Shape Memory Nitinol

    Science.gov (United States)

    Honarvar, Mohammad; Datla, Naresh V.; Konh, Bardia; Podder, Tarun K.; Dicker, Adam P.; Yu, Yan; Hutapea, Parsaoran

    2014-08-01

    Unique thermomechanical properties of Nitinol known as shape memory and superelasticity make it applicable for different fields such as biomedical, structural, and aerospace engineering. These unique properties are due to the comparatively large recoverable strain, which is being produced in a martensitic phase transformation. However, under certain ranges of stresses and temperatures, Nitinol wires exhibit unrecovered strain. For cyclic applications, it is important to understand the strain behavior of Nitinol wires. In this study, the unrecovered strain of different Nitinol wire diameters was investigated using constant stress experiment. Uniaxial tensile test has been also performed to find the range of critical stresses. It was observed that the unrecovered strain produced in the first loading-unloading cycle affects the total strain in the subsequent cycles. Moreover, a critical range of stress was found beyond which the unrecovered strain was negligible while the wires heated up to the range of 70-80°C, depending on the wire diameters. The unrecovered strain of wire diameters of 0.19 mm and less was found to be sensitive to the critical stress. On the other hand, for wire diameters bigger than 0.19 mm this connection between the unrecovered strain and the critical stress was not observed for the same range of heating temperature.

  19. One way and the other: the bidirectional relationship between ambivalence and body movement

    NARCIS (Netherlands)

    I.K. Schneider; A. Eerland; F. van Harreveld; M. Rotteveel; J. van der Pligt; N. van der Stoep; R.A. Zwaan

    2013-01-01

    Prior research exploring the relationship between evaluations and body movements has focused on one-sided evaluations. However, people regularly encounter objects or situations about which they simultaneously hold both positive and negative views, which results in the experience of ambivalence. Such

  20. More than one way to invade: lessons from genetic studies of Carcinus shore crabs

    Science.gov (United States)

    The European green crab Carcinus maenas is one of the world's most widely recognized marine invaders. The success of this species has provided opportunities to explore genetic patterns associated with establishment and population expansion following independent introduction event...

  1. The DPSEEA model: one way to support the 'multiple narratives' of ecological Public Health

    OpenAIRE

    Corincigh, GR

    2009-01-01

    This poster was presented at the UK Public Health Association Conference (UKPHA) in March 2009. Ecological Public Health highlights the impact of globalization & capitalism on our physical & human landscapes. A shift in the Public Health paradigm, is argued, to move from an ideological-laden "single narrative" of unsustainable "risk assessment" to "multiple narratives" of sustainability, considering ecological breakdown and climate change. Public Health, globally is a more blended commu...

  2. Student Modeling of Physical Phenomena as They Derive Integral Formulae: One Way To Reduce Proof Phobia.

    Science.gov (United States)

    Dancis, Jerome

    2001-01-01

    Students in a freshmen calculus course should become fluent in modeling physical phenomena represented by integrals, in particular geometric formulas for volumes and arc length and physical formulas for work. Describes how to train students to became fluent in such modeling and derivation of standard integral formulas. Indicates that these lessons…

  3. Use of One-Way Intrabronchial Valves in Air Leak Management After Tube Thoracostomy Drainage.

    Science.gov (United States)

    Gilbert, Christopher R; Casal, Roberto F; Lee, Hans J; Feller-Kopman, David; Frimpong, Bernice; Dincer, H Erhan; Podgaetz, Eitan; Benzaquen, Sadia; Majid, Adnan; Folch, Erik; Gorden, Jed A; Chenna, Praveen; Chen, Alex; Abouzgheib, Wissam; Sanny Nonyane, Bareng Aletta; Yarmus, Lonny B

    2016-05-01

    A persistent air leak represents significant clinical management problems, potentially affecting morbidity, mortality, and health care costs. In 2008, a unidirectional, intrabronchial valve received humanitarian device exemption for use in managing prolonged air leak after pulmonary resection. Since its introduction, numerous reports exist but no large series describe current utilization or outcomes. Our aim was to report current use of intrabronchial valves for air leaks and review outcome data associated with its utilization. A multicenter, retrospective review of intrabronchial valve utilization from January 2013 to August 2014 was performed at eight centers. Data regarding demographics, valve utilization, and outcomes were analyzed. We identified 112 patients undergoing evaluation for intrabronchial valve placement, with 67% (75 of 112) undergoing valve implantation. Nearly three quarters of patients underwent valve placement for off-label usage (53 of 75). A total of 195 valves were placed in 75 patients (mean 2.6 per patient; range, 1 to 8) with median time to air leak resolution of 16 days (range, 2 to 156). We present the largest, multicenter study of patients undergoing evaluation for intrabronchial valve use for air leak management. Our data suggest the majority of intrabronchial valve placements are occurring for off-label indications. Although the use of intrabronchial valves are a minimally invasive intervention for air leak management, the lack of rigorously designed studies demonstrating efficacy remains concerning. Prospective randomized controlled studies remain warranted. Copyright © 2016 The Society of Thoracic Surgeons. Published by Elsevier Inc. All rights reserved.

  4. Using one-way communications in a market-based resource allocation system

    Science.gov (United States)

    Chassin, David P.; Pratt, Robert G.

    2014-07-22

    Disclosed herein are representative embodiments of methods, apparatus, and systems for distributing a resource (such as electricity) using a resource allocation system. In one exemplary embodiment, a plurality of requests for electricity are received from a plurality of end-use consumers. The requests indicate a requested quantity of electricity and a consumer-requested index value indicative of a maximum price a respective end-use consumer will pay for the requested quantity of electricity. A plurality of offers for supplying electricity are received from a plurality of resource suppliers. The offers indicate an offered quantity of electricity and a supplier-requested index value indicative of a minimum price for which a respective supplier will produce the offered quantity of electricity. A dispatched index value is computed at which electricity is to be supplied based at least in part on the consumer-requested index values and the supplier-requested index values.

  5. More than one way to be happy: a typology of marital happiness.

    Science.gov (United States)

    Rauer, Amy; Volling, Brenda

    2013-09-01

    This study utilized observational and self-report data from 57 happily married couples to explore assumptions regarding marital happiness. Suggesting that happily married couples are not a homogeneous group, cluster analyses revealed the existence of three types of couples based on their observed behaviors in a problem-solving task: (1) mutually engaged couples (characterized by both spouses' higher negative and positive problem-solving); (2) mutually supportive couples (characterized by both spouses' higher positivity and support); and (3) wife compensation couples (characterized by high wife positivity). Although couples in all three clusters were equally happy with and committed to their marriages, these clusters were differentially associated with spouses' evaluations of their marriage. Spouses in the mutually supportive cluster reported greater intimacy and maintenance and less conflict and ambivalence, although this was more consistently the case in comparison to the wife compensation cluster, as opposed to the mutually engaged cluster. The implications of these typologies are discussed as they pertain to efforts on the part of both practitioners to promote marital happiness and repair marital relations when couples are faced with difficulties.

  6. Genes can disconnect the social brain in more than one way

    NARCIS (Netherlands)

    Aleman, A; Kahn, RS

    2004-01-01

    Burns proposes an intriguing hypothesis by suggesting that the "schizophrenia genes" might not be regulatory genes themselves, but rather closely associated with regulatory genes directly involved in the proper growth of the social brain. We point out that this account would benefit from incorporati

  7. Evaluating the one-way coupling of WRF-Hydro for flood forecasting

    Science.gov (United States)

    Yucel, Ismail; Onen, Alper; Yilmaz, Koray; Gochis, David

    2016-04-01

    A fully-distributed, multi-physics, multi-scale hydrologic and hydraulic modeling system, WRF-Hydro, is used to assess the potential for skillful flood forecasting based on precipitation inputs derived from the Weather Research and Forecasting (WRF) model and the EUMETSAT Multi-sensor Precipitation Estimates (MPEs). Similar to past studies it was found that WRF model precipitation forecast errors related to model initial conditions are reduced when the three dimensional atmospheric data assimilation (3DVAR) scheme in the WRF model simulations is used. A comparative evaluation of the impact of MPE versus WRF precipitation estimates, both with and without data assimilation, in driving WRF-Hydro simulated streamflow is then made. The ten rainfall-runoff events that occurred in the Black Sea Region were used for testing and evaluation. With the availability of streamflow data across rainfall-runoff events, the cal- ibration is only performed on the Bartin sub-basin using two events and the calibrated parameters are then transferred to other neighboring three ungauged sub-basins in the study area. The rest of the events from all sub-basins are then used to evaluate the performance of the WRF-Hydro system with the cali- brated parameters. Following model calibration, the WRF-Hydro system was capable of skillfully repro- ducing observed flood hydrographs in terms of the volume of the runoff produced and the overall shape of the hydrograph. Streamflow simulation skill was significantly improved for those WRF model simula- tions where storm precipitation was accurately depicted with respect to timing, location and amount. Accurate streamflow simulations were more evident in WRF model simulations where the 3DVAR scheme was used compared to when it was not used. Because of substantial dry bias feature of MPE, as compared with surface rain gauges, streamflow derived using this precipitation product is in general very poor. Overall, root mean squared errors for runoff were reduced by 22.2% when hydrological model calibration is performed with WRF precipitation. Errors were reduced by 36.9% (above uncalibrated model performance) when both WRF model data assimilation and hydrological model calibration was utilized. Our results also indicated that when assimilated precipitation and model calibration is per- formed jointly, the calibrated parameters at the gauged sites could be transferred to ungauged neighbor- ing basins where WRF-Hydro reduced mean root mean squared error from 8.31 m3/s to 6.51 m3/s.

  8. Residual stresses analysis of friction stir welding using one-way FSI simulation

    Energy Technology Data Exchange (ETDEWEB)

    Kang, Sung Wook; Jang, Beom Seon [Seoul National University, Seoul (Korea, Republic of); Song, Ha Cheol [Mokpo National University, Muan (Korea, Republic of)

    2015-03-15

    When certain mechanisms, such as plastic deformations and temperature gradients, occur and are released in a structure, stresses remain because of the shape of the structure and external constraints. These stresses are referred to as residual stresses. The base material locally expands during heating in the welding process. When the welding is completed and cooled to room temperature, the residual stresses are left at nearly the yield strength level. In the case of friction stir welding, the maximum temperature is 80% to 90% of the melting point of the materials. Thus, the residual stresses in the welding process are smaller than those in other fusion welding processes; these stresses have not been considered previously. However, friction stir welding residual stresses are sometimes measured at approximately 70% or above. These residual stresses significantly affect fatigue behavior and lifetime. The present study investigates the residual stress distributions in various welding conditions and shapes of friction stir welding. In addition, the asymmetric feature is considered in temperature and residual stress distribution. Heat transfer analysis is conducted using the commercial computational fluid dynamics program Fluent, and results are used in the finite element structural analysis with the ANSYS Multiphysics software. The calculated residual stresses are compared with experimental values using the X-ray diffraction method.

  9. Optimizing dynamic downscaling in one-way nesting using a regional ocean model

    Science.gov (United States)

    Pham, Van Sy; Hwang, Jin Hwan; Ku, Hyeyun

    2016-10-01

    Dynamical downscaling with nested regional oceanographic models has been demonstrated to be an effective approach for both operationally forecasted sea weather on regional scales and projections of future climate change and its impact on the ocean. However, when nesting procedures are carried out in dynamic downscaling from a larger-scale model or set of observations to a smaller scale, errors are unavoidable due to the differences in grid sizes and updating intervals. The present work assesses the impact of errors produced by nesting procedures on the downscaled results from Ocean Regional Circulation Models (ORCMs). Errors are identified and evaluated based on their sources and characteristics by employing the Big-Brother Experiment (BBE). The BBE uses the same model to produce both nesting and nested simulations; so it addresses those error sources separately (i.e., without combining the contributions of errors from different sources). Here, we focus on discussing errors resulting from the spatial grids' differences, the updating times and the domain sizes. After the BBE was separately run for diverse cases, a Taylor diagram was used to analyze the results and recommend an optimal combination of grid size, updating period and domain sizes. Finally, suggested setups for the downscaling were evaluated by examining the spatial correlations of variables and the relative magnitudes of variances between the nested model and the original data.

  10. One-way data transfer for PLC to VME status reporting at the Advanced Photon Source

    Science.gov (United States)

    Stein, S. J.

    1994-12-01

    The Personnel Safety System for the experimental beamlines at the Advanced Photon Source will use a large number of Allen Bradley Programmable Logic Controllers (PLC) to replace conventional relay logic. PLCs allow for the design of a very advanced safety system that can handle a large number of I/O points. Certain situations require monitoring of the safety system from various locations around the storage ring via the EPICS OPI (operator interface) consoles. This presentation covers the chosen method for transferring data from the Personnel Safety System into an EPICS database. Specifications on PLC ladder design, EPICS database design and hardware selection are also discussed.

  11. 47 CFR 22.589 - One-way or two-way application requirements.

    Science.gov (United States)

    2010-10-01

    ... exceeds 76.4 kilometers (47.5 miles); and identify each protected Basic Exchange Telephone Radio System... applications to operate a transmitter with ERP exceeding the basic power and height-power limits of § 22.565...

  12. Thermomechanical characterization of one-way shape memory Nitinol as an actuator for active surgical needle

    Science.gov (United States)

    Honarvar, Mohammad

    Needle-based intervention insertion is one of the common surgical techniques used in many diagnostic and therapeutic percutaneous procedures. The success of such procedures highly depends on the accuracy of needle placement at target locations. An active needle has the potential to enhance the accuracy of needle placement as well as to improve clinical outcome. Bending forces provided by the attached actuators can assist the maneuverability in order to reach the targets following a desired trajectory. There are three major research parts in the development of active needle project in the Composites Laboratory of Temple University. They are thermomechanical characterization of shape memory alloy (SMA) or Nitinol as an actuator for smart needle, mechanical modeling and design of smart needles, and study of tissue needle interaction. The characterization of SMA is the focus of this dissertation. Unique thermomechanical properties of Nitinol known as shape memory effect and superelasticity make it applicable for different fields such as biomedical, structural and aerospace engineering. These unique behaviors are due to the comparatively large amount of recoverable strain which is being produced in a martensitic phase transformation. However, under certain ranges of stresses and temperatures, Nitinol wires exhibit unrecovered strain (also known as residual strain); which limits their applicability. Therefore, for applications that rely on the strain response in repetitive loading and unloading cycles, it is important to understand the generation of the unrecovered strain in the Nitinol wires. In this study, the unrecovered strain of Nitinol wires with various diameters was investigated, using two experimental approaches: constant stress and uniaxial tensile tests. Moreover, a critical range of stress was found beyond which the unrecovered strain was negligible at temperatures of 70 to 80°C depending on the wire diameter. Wire diameters varied from 0.10 to 0.29 mm were tested and different ranges of critical stress were found for different wire diameters. The transformation temperatures of different wire diameters at zero stress have been achieved by performing the Differential Scanning Calorimetry (DSC) test. The actuation force created by Nitinol wire is measured through constant strain experiment. X-Ray Diffraction (XRD) study was also performed to investigate the phase of Nitinol wires under various thermomechanical loading conditions. In summary, the effect of wire diameter on the required critical stresses to avoid the unrecovered strain between first and second cycle of heating and cooling are presented and the results of both mechanical tests are justified by the results obtained from the XRD study.

  13. Pairwise Comparison Procedures for One-Way Analysis of Variance Designs. Research Report.

    Science.gov (United States)

    Zwick, Rebecca

    Research in the behavioral and health sciences frequently involves the application of one-factor analysis of variance models. The goal may be to compare several independent groups of subjects on a quantitative dependent variable or to compare measurements made on a single group of subjects on different occasions or under different conditions. In…

  14. INPUT,INTAKE,AND OUTPUT IN ONE-WAY DRAWING TASK

    Institute of Scientific and Technical Information of China (English)

    Lin; Yan

    1999-01-01

    It is agreed that input plays a critical role in language acquisition.Without input the learner hasnothing.But the question is what kind,form and amount of input is most useful for language learners.Krashen(1980)has argued that the input given to the learners has to be comprehensible for acquisition tohappen.He defined it as input which is slightly beyond the learner’s current knowledge level(in his termI+1).Swain(1985)explained that comprehensible input means that"language directed to the learnersthat contains some new element in it but this is nevertheless understood by the learner because of linguis-tic,paralinguistie,or situational cues,or world knowledge backup."(p.245).She further argued that

  15. Numerical Study of Structural Vibration Induced by Combustion Noise - One Way Interaction

    NARCIS (Netherlands)

    Pozarlik, Artur Krzysztof; Kok, Jacobus B.W.

    2007-01-01

    The turbulent flame in the lean combustion regime in a gas turbine combustor generates significant thermo-acoustic noise. The thermo-acoustic noise induces liner vibrations that may lead to fatigue damage of the combustion system. This phenomenon is investigated in the project FLUISTCOM using both

  16. Creating and Sharing Annotated Bibliographies: One Way to Become Familiar with Exemplary Multicultural Literature

    Science.gov (United States)

    Richards, Janet C.

    2015-01-01

    Teachers who meet Common Core recommendations about teaching with multicultural literature need to recognize the traditions, values, and customs of various cultures so they can make sound decisions about the authenticity of the books they select for their students. Furthermore, teachers who support students' literacy achievements with exemplary…

  17. Behind the scenes of GS: there’s only one way to go

    CERN Multimedia

    Anaïs Schaeffer

    2014-01-01

    At CERN, all of the Laboratory’s imports and exports are routed in the same way: through the Logistics Service. This GS-IS Group service is responsible for receiving, inspecting and distributing all goods sent to the Organization.   Whether products for the CERN Stores, components for the experiments, tools, machinery and materials for the workshops or equipment for users and members of the personnel, nothing escapes the attention of CERN’s Logistics Service, which every year processes nearly 70,000 incoming deliveries, 7,500 shipments and 160,000 distributed items. “The vast majority of our imports come from CERN Member States,” says imports and customs procedures manager Laurence Planque, “but we are receiving more and more goods for collaborators working at CERN from non-Member States such as China, India and Pakistan. All these imports are entitled to diplomatic exemption, so every day we have to manage the customs clearance procedures wit...

  18. One Way to Eliminate Corruption—Educating People——Brief Introduction on Bid

    Institute of Scientific and Technical Information of China (English)

    QiuShi-feng; YangRu-ping

    2001-01-01

    This article,according to the author's working experience in a hydropower project,briefly introduces some basic knowledge about bidding process and sample contract document.It is aiming at giving a common knowledge to the students who will be involved in work relating to bid after their graduation in the college.It is hoped that this kind of knowledge can help people properly use funds for a project and thus corruption can be minimized.

  19. One Way Multimedia Broadcasting as a Tool for Education and Development in Developing Nations

    Science.gov (United States)

    Chandrasekhar, M. G.; Venugopal, D.; Sebastian, M.; Chari, B.

    2000-07-01

    An improved quality of life through education and developmental communication is an important necessity of societal up-liftment in the new millennium, especially in the developing nations. The population explosion and the associated pressure on the scarce resources to meet the basic necessities have made it more or less impossible for most of the nations to invest reasonable resources in realizing adequate channels of formal education. Thanks to the developments in satellite communication and associated technologies, new vistas are available today to provide education and developmental communication opportunities to millions of people, spread across the globe. Satellite based Digital Audio and Multimedia Broadcasting is one such new development that is being viewed as an innovative space application in the coming decades. The potential of DAB technology to reach education, information and entertainment directly to the user through a specially designed receiver could be efficiently utilized by the developing nations to overcome their difficulties in realizing formal channels of education and information dissemination. WorldSpace plans to launch three geo-stationary satellites that would cover most of the developing economies in Africa, the Mediterranean, the Middle East, Asia, Latin America and the Caribbean. Apart from a variety of digital, high quality audio channels providing news, views, education and entertainment opportunities, the end users can also get a responsive multimedia. The multimedia is being planned as a specially packaged offering that can meet the demand of students, professionals as well as certain special groups who have certain specific data and information requirements. Apart from WorldSpace, renowned agencies/firms from different parts of the world shall provide the required content to meet these requirements. Though the Internet option is available, higher telephone charges and the difficulty in getting access have made this option less interesting and unpopular in most of the developing countries. The proposed digital audio and multimedia offering from WorldSpace to millions of consumers spread across more than 120 countries is considered as a unique tool for education and development, particularly in the developing nations. In this paper, an attempt is made to briefly describe the issues associated with education and development in developing countries, the WorldSpace offering and how a developing nation can benefit from this offering in the coming decades.

  20. 47 CFR 90.490 - One-way paging operations in the private services.

    Science.gov (United States)

    2010-10-01

    ... directly from telephone positions in the public switched telephone network. When land stations are multiple licensed or otherwise shared by authorized users, arrangements for the telephone service must be made with...-shared basis. When telephone service costs are shared, at least one licensee participating in the...

  1. 49 CFR 232.403 - Design standards for one-way end-of-train devices.

    Science.gov (United States)

    2010-10-01

    ... FCC. (2) If power is supplied by one or more batteries, the operating life shall be a minimum of 36... brake pipe pressure of ±2 psig and at intervals of not greater than 70 seconds when the variation in the rear car brake pipe pressure over the 70-second interval is less than ±2 psig. (d)...

  2. Cohesive cracked-hinge model for simulation of fracture in one-way slabs on grade

    DEFF Research Database (Denmark)

    Skar, Asmus; Poulsen, Peter Noe; Olesen, John Forbes

    2017-01-01

    Numerical analysis of slab on grade structures subjected to mechanical loads is a complex matter often requiring computationally expensive models. In order to develop a simplified and general concept for non-linear analysis of slab on grade structures, this paper presents a cohesive cracked...

  3. Mutation rates among RNA viruses

    OpenAIRE

    Drake, John W.; Holland, John J.

    1999-01-01

    The rate of spontaneous mutation is a key parameter in modeling the genetic structure and evolution of populations. The impact of the accumulated load of mutations and the consequences of increasing the mutation rate are important in assessing the genetic health of populations. Mutation frequencies are among the more directly measurable population parameters, although the information needed to convert them into mutation rates is often lacking. A previous analysis of mutation rates in RNA viru...

  4. The KUSC Classical Music Dataset for Audio Key Finding

    Directory of Open Access Journals (Sweden)

    Ching-Hua Chuan

    2014-08-01

    Full Text Available In this paper, we present a benchmark dataset based on the KUSC classical music collection and provide baseline key-finding comparison results. Audio key finding is a basic music information retrieval task; it forms an essential component of systems for music segmentation, similarity assessment, and mood detection. Due to copyright restrictions and a labor-intensive annotation process, audio key finding algorithms have only been evaluated using small proprietary datasets to date. To create a common base for systematic comparisons, we have constructed a dataset comprising of more than 3,000 excerpts of classical music. The excerpts are made publicly accessible via commonly used acoustic features such as pitch-based spectrograms and chromagrams. We introduce a hybrid annotation scheme that combines the use of title keys with expert validation and correction of only the challenging cases. The expert musicians also provide ratings of key recognition difficulty. Other meta-data include instrumentation. As demonstration of use of the dataset, and to provide initial benchmark comparisons for evaluating new algorithms, we conduct a series of experiments reporting key determination accuracy of four state-of-the-art algorithms. We further show the importance of considering factors such as estimated tuning frequency, key strength or confidence value, and key recognition difficulty in key finding. In the future, we plan to expand the dataset to include meta-data for other music information retrieval tasks.

  5. Long-distance practical quantum key distribution by entanglement swapping

    CERN Document Server

    Scherer, Artur; Tittel, Wolfgang

    2010-01-01

    We develop a model for practical, entanglement-based long-distance quantum key distribution employing entanglement swapping as a key building block. Relying only on existing off-the-shelf technology, we show how to optimize resources so as to maximize secret key distribution rates. The tools comprise lossy transmission links, such as telecom optical fibers or free space, parametric down-conversion sources of entangled photon pairs, and threshold detectors that are inefficient and have dark counts. Our analysis provides the optimal trade-off between detector efficiency and dark counts, which are usually competing, as well as the optimal source brightness that maximizes the secret key rate for specified distances (i.e. loss) between sender and receiver.

  6. Key Obama officials leave administration

    Science.gov (United States)

    Showstack, Randy

    2013-01-01

    Secretary of the Interior Ken Salazar is one of the latest members of the Obama administration to announce that he is leaving his position near the start of President Obama's second term in office. Salazar, who has served as interior secretary since January 2009, intends to leave the department by the end of March, the department noted on 16 January. Salazar joins a number of other key officials who are planning to leave the administration. They include Environmental Protection Agency administrator Lisa Jackson, National Oceanic and Atmospheric Administration administrator Jane Lubchenco, and U.S. Geological Survey director Marcia McNutt.

  7. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  8. Key paediatric messages from Amsterdam

    Directory of Open Access Journals (Sweden)

    Jonathan Grigg

    2016-04-01

    Full Text Available The Paediatric Assembly of the European Respiratory Society (ERS maintained its high profile at the 2015 ERS International Congress in Amsterdam. There were symposia on preschool wheeze, respiratory sounds and cystic fibrosis; an educational skills workshop on paediatric respiratory resuscitation; a hot topic session on risk factors and early origins of respiratory diseases; a meet the expert session on paediatric lung function test reference values; and the annual paediatric grand round. In this report the Chairs of the Paediatric Assembly's Groups highlight the key messages from the abstracts presented at the Congress.

  9. Key energy technologies for Europe

    DEFF Research Database (Denmark)

    Jørgensen, B.H.

    2005-01-01

    This report on key energy technologies is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. Senior Scientist BirteHolst Jørgensen, Risø National Laboratory......, is responsible for the report, which is based on literature studies. Post Doc Stefan Krüger Nielsen, Risø National Laboratory, has contributed to parts of the report, including the description of the IEA energyscenarios, the IEA statistics on R&D and the description of the science and technology base of biomass...

  10. Symmetric autocompensating quantum key distribution

    Science.gov (United States)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  11. Free-space quantum key distribution with entangled photons

    CERN Document Server

    Marcikic, I; Kurtsiefer, C; Marcikic, Ivan; Lamas-Linares, Antia; Kurtsiefer, Christian

    2006-01-01

    We report on a complete experimental implementation of a quantum key distribution protocol through a free space link using polarization-entangled photon pairs from a compact parametric down-conversion source. Over 10 hours of uninterrupted communication between sites 1.5 km apart, we observe average key generation rates of 630 per second after error correction and privacy amplification. Our scheme requires no specific hardware channel for synchronization apart from a classical wireless link, and no explicit random number generator.

  12. High-speed free-space quantum key distribution system for urban daylight applications.

    Science.gov (United States)

    García-Martínez, M J; Denisenko, N; Soto, D; Arroyo, D; Orue, A B; Fernandez, V

    2013-05-10

    We report a free-space quantum key distribution system designed for high-speed key transmission in urban areas. Clocking the system at gigahertz frequencies and efficiently filtering background enables higher secure key rates than those previously achieved by similar systems. The transmitter and receiver are located in two separate buildings 300 m apart in downtown Madrid and they exchange secure keys at rates up to 1 Mbps. The system operates in full bright daylight conditions with an average secure key rate of 0.5 Mbps and 24 h stability without human intervention.

  13. Authenticated Key Agreement in Group Settings

    Institute of Scientific and Technical Information of China (English)

    LI Ming; WANG Yong; GU Da-wu; BAI Ying-cai

    2006-01-01

    An enhanced definition of implicit key authentication and a secure group key agreement scheme from pairings are presented. This scheme combines the merits of group public key and key trees to achieve a communication-efficient and authenticated group key agreement protocol. Besides, it avoids dependence on signature or MAC by involving member's long-term keys and short-term keys in the group key. Furthermore, the idea behind this design can be employed as a general approach to extend the authenticated two-party Diffie-Hellman protocols to group settings.

  14. Some keys to reread authority.

    Directory of Open Access Journals (Sweden)

    Edgar Straehle

    2015-12-01

    Full Text Available This article vindicates a rereading of the concept of authority and tries to dissociate this concept from the concept of power in order to undo their identification and thereby the oblivion of the specific nature (or the history of authority. Besides, this rereading must not be confused with an apology of authority but with an exploration about this complicated and ambivalent category. The key point of this distinction lies in that authority, unlike power, depends not on itself but on the other person, the person who acknowledges another one as authority. Therefore, authority can be compatible with freedom and can appear as an exteriority of power, which undermines it or even becomes a counterpower. Hence the logical endeavours of power to monopolize and instrumentalize authority.

  15. Key to Language Learning Success

    Directory of Open Access Journals (Sweden)

    Oktavian Mantiri

    2015-01-01

    Full Text Available This paper looks at the important elements of language learning and teaching i.e. the role of teachers as well as the attitude and motivation of learners. Teachers undoubtedly play crucial roles in students’ language learning outcome which could ignite or diminish students’ motivation. Positive attitudes and motivation – instrumental or integrative and intrinsic or extrinsic – are key to successful learning. Therefore it is paramount for language teachers as well as learners to know these roles and nurture the best possible ways where language teaching and learning will thrive. This paper also suggested that both stake-holders should be open to holistic approach of language learning and that other factors such as the environment could play an important part in language teaching and learning success.

  16. Key Aspects of Wave Energy

    DEFF Research Database (Denmark)

    Margheritini, Lucia; Nørgaard, Jørgen Harck

    2012-01-01

    Diversification of renewable energy sources is fundamental to ensure sustainability. In this contest, wave energy can provide a substantial contribution as soon as the sector breaks into the market. In order to accelerate shift from a technology to a market focus and reduce technical and non...... be used as a breakwater therefore providing a solid structure for harbor protection; the Wave Star can be used as a base for offshore wind and photovoltaic installation in the middle of the sea, realizing an hybrid renewable energy platform. It is the authors´ believe that taking wave energy devices......-technical risks, it is critical to provide comprehensive and reliable information on the technologies without neglecting attractive advantages. It is possible to underline a different key of lecture of wave energy performance by considering efficiency and power production as well as device versatility...

  17. Fibre optic communication key devices

    CERN Document Server

    Grote, Norbert

    2017-01-01

    The book gives an in-depth description of key devices of current and next generation fibre optic communication networks. Devices treated include semiconductor lasers, optical amplifiers, modulators, wavelength filters and other passives, detectors, all-optical switches, but relevant properties of optical fibres and network aspects are included as well. The presentations include the physical principles underlying the various devices, technologies used for their realization, typical performance characteristics and limitations, but development trends towards more advanced components are also illustrated. This new edition of a successful book was expanded and updated extensively. The new edition covers among others lasers for optical communication, optical switches, hybrid integration, monolithic integration and silicon photonics. The main focus is on Indium phosphide-based structures but silicon photonics is included as well. The book covers relevant principles, state-of-the-art implementations, status of curren...

  18. New Weak Keys in RSA

    Institute of Scientific and Technical Information of China (English)

    WANG Baocang; LIU Shuanggen; HU Yupu

    2006-01-01

    The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by factoring a well-chosen quadratic polynomial with integral coefficients. When viewed as a general-purpose algorithm, the new algorithm has a high computational complexity. It is shown that the RSA number n=pq can be easily factored if p and q have the special form of p=as+b, q=cs+d, where a, b, c, d are relatively small numbers. Such prime pairs (p, q) are the weak keys of RSA, so when we generate RSA modulus, we should avoid using such prime pairs (p, q).

  19. Key energy technologies for Europe

    Energy Technology Data Exchange (ETDEWEB)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO{sub 2} capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  20. Key attributes of expert NRL referees.

    Science.gov (United States)

    Morris, Gavin; O'Connor, Donna

    2017-05-01

    Experiential knowledge of elite National Rugby League (NRL) referees was investigated to determine the key attributes contributing to expert officiating performance. Fourteen current first-grade NRL referees were asked to identify the key attributes they believed contributed to their expert refereeing performance. The modified Delphi method involved a 3-round process of an initial semi-structured interview followed by 2 questionnaires to reach consensus of opinion. The data revealed 25 attributes that were rated as most important that underpin expert NRL refereeing performance. Results illustrate the significance of the cognitive category, with the top 6 ranked attributes all cognitive skills. Of these, the referees ranked decision-making accuracy as the most important attribute, followed by reading the game, communication, game understanding, game management and knowledge of the rules. Player rapport, positioning and teamwork were the top ranked game skill attributes underpinning performance excellence. Expert referees also highlighted a number of psychological attributes (e.g., concentration, composure and mental toughness) that were significant to performance. There were only 2 physiological attributes (fitness, aerobic endurance) that were identified as significant to elite officiating performance. In summary, expert consensus was attained which successfully provided a hierarchy of the most significant attributes of expert NRL refereeing performance.